Atjaunināt sīkdatņu piekrišanu

Provable and Practical Security: 16th International Conference, ProvSec 2022, Nanjing, China, November 1112, 2022, Proceedings 1st ed. 2022 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 291 pages, height x width: 235x155 mm, weight: 468 g, 29 Illustrations, color; 25 Illustrations, black and white; IX, 291 p. 54 illus., 29 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13600
  • Izdošanas datums: 07-Nov-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031209168
  • ISBN-13: 9783031209161
  • Mīkstie vāki
  • Cena: 60,29 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 70,94 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 291 pages, height x width: 235x155 mm, weight: 468 g, 29 Illustrations, color; 25 Illustrations, black and white; IX, 291 p. 54 illus., 29 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13600
  • Izdošanas datums: 07-Nov-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031209168
  • ISBN-13: 9783031209161
This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022. 

 The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.
Encryption.- A Generic Construction of CCA-secure Attribute-based
Encryption with Equality Test.- Secure-Channel Free Certificateless
Searchable Public key Authenticated Encryption with Keyword Search.- More
Efficient Verifiable Functional Encryption.- Subverting Deniability.- Epoch
Confidentiality in Updatable Encryption.- Lattice Based
Cryptography.- Simplified Server-Aided Revocable Identity-Based Encryption
from Lattices.- Lattice-based Public Key Cryptosystems invoking Linear
Mapping Mask.- Batched Fully Dynamic Multi-key FHE from FHEW-like
Cryptosystems.- Zero-knowledge Range Arguments for Signed Fractional Numbers
from Lattices.- Information Security.- Fast Out-of-band Data Integrity
Monitor to Mitigate Memory Corruption Attacks.- Construction of a New UAV
Management System based on UMIA Technology.- FP2-MIA: A Membership Inference
Attack Free of Posterior Probability in Machine Unlearning.- Practical
Federated Learning for Samples with Different
IDs.- Blockchain.- Reinforcement-Mining: Protecting Reward in Selfish
Mining.- FolketID: A Decentralized Blockchain-based NemID Alternative against
DDosS Attacks.- Secure Collaboration between Consortiums in Permissioned
Blockchains.- Foundations.- (Public) Verifiability For Composable Protocols
Without Adaptivity Or Zero-Knowledge.- Practical Non-Malleable Codes from
Symmetric-key Primitives in 2-Split-State Model.- Cryptographic Role-Based
Access Control, Reconsidered.