Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I

Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023.

The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: 
Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; 
Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
Signature: TVES: Threshold Verifiably Encrypted Signature and Its
Applications.- Compact Accountable Ring Signatures in the Plain
Model.- Universally Composable Key-Insulated and Privacy-Preserving Signature
Scheme with Publicly Derived Public Key.- Compact Ring Signatures with
Post-Quantum Security in Standard Model.- Secure Multi-Party SM2 Signature
based on SPDZ Protocol.- Blockchain: Epoch: Enabling Path Concealing Payment
Channel Hubs with Optimal Path Encryption.- A General Federated Learning
Scheme with Blockchain on non-IID Data.- A Blockchain-Based Personal Health
Record Sharing Scheme with Security and Privacy Preservation.- Cryptography
primitive: General Constructions of Fuzzy Extractors for Continuous
Sources.- Geometry-based Garbled Circuits Relying Solely on One Evaluation
Algorithm under Standard Assumption.- Full Domain Functional Bootstrapping
with Least Significant Bit Encoding.- Public key cryptography: PFE: Linear
Active Security, Double-Shuffle Proofs, and LowComplexity
Communication.- CCA-secure Identity-Based Matchmaking Encryption from
Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable
Encryption with Forward Security: General Construction, and
Applications.- Public Key Authenticated Encryption with Keyword Search
Improved: Strong Security Model and Multi-keyword
Construction.- Identity-Based Proxy Re-encryption Based on SM9.- Security and
Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting
Aggressive Query.- An Improved Method for Evaluating Secret Variables and Its
Application to WAGE.- Exploring Emotion Trends in Product Reviews: A
Multi-modal Analysis with Malicious Comment Filtering and User Privacy
Protection.- XPORAM: A Practical Multi-Client ORAM against Malicious
Adversaries.- A Multi-scene Webpage Fingerprinting Method Based on Multi-head
Attention and Data Enhancement.- A Lightweight Access Control Scheme
Supporting Policy Hidden based on Path Bloom Filter.- MFL-RAT: Multi-class
Few-shot Learning Method For Encrypted RAT Traffic Detection.