ISBN13: | 9789819609567 |
ISBN10: | 9819609569 |
Kötéstípus: | Puhakötés |
Terjedelem: | 295 oldal |
Méret: | 235x155 mm |
Nyelv: | angol |
Illusztrációk: | 45 Illustrations, black & white |
700 |
Rendszeranalízis, rendszertervezés
Adatvédelem, adatbiztonság
A számítógép és az információs technológia hatása a társadalomra
Rendszeranalízis, rendszertervezés (karitatív célú kampány)
Adatvédelem, adatbiztonság (karitatív célú kampány)
A számítógép és az információs technológia hatása a társadalomra (karitatív célú kampány)
Provable and Practical Security
EUR 62.05
Kattintson ide a feliratkozáshoz
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024.
The 26 full papers and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections:
Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.
Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
.- Tight Security.
.- Efficient Variants of TNT with BBB Security.
.- ROM Reduction Failures: Reasons and Solutions.
.- Quantum-Safe Cryptography.
.- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials.
.- Semi-Compressed CRYSTALS-Kyber.
.- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security.
.- Distributed System and Blockchain Security.
.- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph.
.- PDTS: Practical Data Trading Scheme in Distributed Environments.
.- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function.
.- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping.
.- Key Exchange and Privacy.
.- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.
.- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming.
.- Short Papers.
.- SePEnTra: A secure and privacy-preserving energy trading mechanism in the transactive energy market.
.- On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages.
.- Reusable Fuzzy Extractor from Isogeny.
.- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts.
.- DPAC: A New Data-centric Privacy-preserving Access Control Model.
.- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum.
.- A2V: Anonymous and Accountable Voting Framework via Blockchain.
.- Quantum Safe Computation-friendly Identity-binding Password Authenticated Key Exchange.