Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 910, 2023, Revised Selected Papers, Part I 2024 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 475 pages, height x width: 235x155 mm, 71 Illustrations, color; 41 Illustrations, black and white; XVII, 475 p. 112 illus., 71 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14526
  • Izdošanas datums: 26-Feb-2024
  • Izdevniecība: Springer Nature
  • ISBN-10: 9819709415
  • ISBN-13: 9789819709410
  • Mīkstie vāki
  • Cena: 73,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 86,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 475 pages, height x width: 235x155 mm, 71 Illustrations, color; 41 Illustrations, black and white; XVII, 475 p. 112 illus., 71 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14526
  • Izdošanas datums: 26-Feb-2024
  • Izdevniecība: Springer Nature
  • ISBN-10: 9819709415
  • ISBN-13: 9789819709410
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023.

The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: 
Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; 
Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
Signature: TVES: Threshold Verifiably Encrypted Signature and Its
Applications.- Compact Accountable Ring Signatures in the Plain
Model.- Universally Composable Key-Insulated and Privacy-Preserving Signature
Scheme with Publicly Derived Public Key.- Compact Ring Signatures with
Post-Quantum Security in Standard Model.- Secure Multi-Party SM2 Signature
based on SPDZ Protocol.- Blockchain: Epoch: Enabling Path Concealing Payment
Channel Hubs with Optimal Path Encryption.- A General Federated Learning
Scheme with Blockchain on non-IID Data.- A Blockchain-Based Personal Health
Record Sharing Scheme with Security and Privacy Preservation.- Cryptography
primitive: General Constructions of Fuzzy Extractors for Continuous
Sources.- Geometry-based Garbled Circuits Relying Solely on One Evaluation
Algorithm under Standard Assumption.- Full Domain Functional Bootstrapping
with Least Significant Bit Encoding.- Public key cryptography: PFE: Linear
Active Security, Double-Shuffle Proofs, and LowComplexity
Communication.- CCA-secure Identity-Based Matchmaking Encryption from
Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable
Encryption with Forward Security: General Construction, and
Applications.- Public Key Authenticated Encryption with Keyword Search
Improved: Strong Security Model and Multi-keyword
Construction.- Identity-Based Proxy Re-encryption Based on SM9.- Security and
Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting
Aggressive Query.- An Improved Method for Evaluating Secret Variables and Its
Application to WAGE.- Exploring Emotion Trends in Product Reviews: A
Multi-modal Analysis with Malicious Comment Filtering and User Privacy
Protection.- XPORAM: A Practical Multi-Client ORAM against Malicious
Adversaries.- A Multi-scene Webpage Fingerprinting Method Based on Multi-head
Attention and Data Enhancement.- A Lightweight Access Control Scheme
Supporting Policy Hidden based on Path Bloom Filter.- MFL-RAT: Multi-class
Few-shot Learning Method For Encrypted RAT Traffic Detection.