Provable and Practical Security - Liu, Joseph K.; Chen, Liqun; Sun, Shi-Feng;(szerk.) - Prospero Internetes Könyváruház

Provable and Practical Security

18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25?27, 2024, Proceedings, Part II
 
Kiadó: Springer
Megjelenés dátuma:
Kötetek száma: 1 pieces, Book
 
Normál ár:

Kiadói listaár:
EUR 62.05
Becsült forint ár:
26 973 Ft (25 688 Ft + 5% áfa)
Miért becsült?
 
Az Ön ára:

24 815 (23 633 Ft + 5% áfa )
Kedvezmény(ek): 8% (kb. 2 158 Ft)
A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
Kattintson ide a feliratkozáshoz
 
Beszerezhetőség:

Még nem jelent meg, de rendelhető. A megjelenéstől számított néhány héten belül megérkezik.
 
  példányt

 
Hosszú leírás:

This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 



The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 



Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.



Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy

Tartalomjegyzék:

.- Tight Security.



.- Efficient Variants of TNT with BBB Security.



.- ROM Reduction Failures: Reasons and Solutions.



.- Quantum-Safe Cryptography.



.- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials.



.- Semi-Compressed CRYSTALS-Kyber.



.- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security.



.- Distributed System and Blockchain Security.



.- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph.



.- PDTS: Practical Data Trading Scheme in Distributed Environments.



.- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function.



.- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping.



.- Key Exchange and Privacy.



.- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.



.- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming.



.- Short Papers.



.- SePEnTra: A secure and privacy-preserving energy trading mechanism in the transactive energy market.



.- On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages.



.- Reusable Fuzzy Extractor from Isogeny.



.- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts.



.- DPAC: A New Data-centric Privacy-preserving Access Control Model.



.- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum.



.- A2V: Anonymous and Accountable Voting Framework via Blockchain.



.- Quantum Safe Computation-friendly Identity-binding Password Authenticated Key Exchange.