Atjaunināt sīkdatņu piekrišanu

Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 2527, 2024, Proceedings, Part I [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 310 pages, height x width: 235x155 mm, 26 Illustrations, color; 22 Illustrations, black and white; XV, 310 p. 48 illus., 26 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14903
  • Izdošanas datums: 01-Feb-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819609534
  • ISBN-13: 9789819609536
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 61,19 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 71,99 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 310 pages, height x width: 235x155 mm, 26 Illustrations, color; 22 Illustrations, black and white; XV, 310 p. 48 illus., 26 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14903
  • Izdošanas datums: 01-Feb-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819609534
  • ISBN-13: 9789819609536
Citas grāmatas par šo tēmu:
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 





The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 





Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.





Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
.- Multi-Party Computation.



.- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party
Computation.



.- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings.



.- Secure Five-party Computation with Private Robustness and Minimal Online
Communication.



.- Model Extraction Attack on MPC Hardened Vertical Federated Learning.



.- Searchable Encryption.



.- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern
Hiding.



.- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption
with Optimized Storage.



.- Encryption.



.- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis
Scheme Using Decentralized Multi-Client Functional Encryption.



.- Ideal Public Key Encryption, Revisited.



.- Simple Construction of PEKS from LWE-based IBE in the Standard Model.



.- Signature.



.- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from
Standard Assumptions.



.- Tightly Secure Identity-based Signature from Cryptographic Group Actions.



.- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way
Signature.



.- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing.



.- Threshold Ring Signatures: From DualRing to the t+1 Rings.



.- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle
Model.