Atjaunināt sīkdatņu piekrišanu

Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 2527, 2024, Proceedings, Part II [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 312 pages, height x width: 235x155 mm, 22 Illustrations, color; 25 Illustrations, black and white; XVI, 312 p. 47 illus., 22 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14904
  • Izdošanas datums: 01-Feb-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819609569
  • ISBN-13: 9789819609567
  • Mīkstie vāki
  • Cena: 54,05 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 63,59 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 312 pages, height x width: 235x155 mm, 22 Illustrations, color; 25 Illustrations, black and white; XVI, 312 p. 47 illus., 22 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14904
  • Izdošanas datums: 01-Feb-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819609569
  • ISBN-13: 9789819609567
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 





The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 





Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.





Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
.- Tight Security.



.- Efficient Variants of TNT with BBB Security.



.- ROM Reduction Failures: Reasons and Solutions.



.- Quantum-Safe Cryptography.



.- BDEC: Enhancing Learning Credibility via Post-Quantum Digital
Credentials.



.- Semi-Compressed CRYSTALS-Kyber.



.- Blocklistable Anonymous Credential for Circuits with Post-Quantum
Security.



.- Distributed System and Blockchain Security.



.- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on
Directed Acyclic Graph.



.- PDTS: Practical Data Trading Scheme in Distributed Environments.



.- Communication-Efficient Secure Neural Network via Key-Reduced Distributed
Comparison Function.



.- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping.



.- Key Exchange and Privacy.



.- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.



.- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic
Programming.



.- Short Papers.



.- SePEnTra: A secure and privacy-preserving energy trading mechanism in the
transactive energy market.



.- On Multi-user Security of Lattice-based Signature under Adaptive
Corruptions and Key Leakages.



.- Reusable Fuzzy Extractor from Isogeny.



.- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart
Contracts.



.- DPAC: A New Data-centric Privacy-preserving Access Control Model.



.- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum.



.- A2V: Anonymous and Accountable Voting Framework via Blockchain.



.- Quantum Safe Computation-friendly Identity-binding Password Authenticated
Key Exchange.