Muutke küpsiste eelistusi

E-raamat: Provable and Practical Security: 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings

Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 80,26 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023.  





The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
Fundamentals & Cryptographic Primitives.- Efficient Zero-Knowledge
Arguments for Matrix Relations over Rings and Non-malleable
Enhancement.- Reversible Data Hiding in Encrypted Images Based on Block
Classification Coding of Sparse Representation.- Signcryption-based Encrypted
Traffic Detection Scheme for Fast Establishing Secure
Connections.- Cryptanalysis.- Improved Key-Recovery Attacks under Imperfect
SCA Oracle for Latticebased KEMs.- Linear Cryptanalysis of Lightweight Block
Cipher WARP.- Linicrypt in the Ideal Cipher Model.- Signature.- SMHSDVS: A
Secure and Mutual Heterogeneous Strong Designated Signature between PKI and
IBC.- Key-Range Attribute-Based Signatures for Range of Inner Product and
Its Applications.- A Certificateless Aggregate Signature Scheme with Better
Security.- Constant-size Group Signatures with Message-Dependent Opening from
Lattices.- Post-quantum SigmaProtocols and Signatures from Low-Rank Matrix
Completions.- Threshold Ring Signature Scheme from Cryptographic Group
Action.- Encryption.- Homomorphic Witness Encryption from Indistinguishable
Obfuscation.- Identity-based Matchmaking Encryption Secure against Key
Generation Center.- Multi-Input Functional Encryption for Unbounded Inner
Products.- FleS: a compact and parameter-flexible supersingular isogeny based
public key encryption scheme.- A New Revocable Attribute Based Encryption on
Lattice.- An efficient keyword-based ciphertext retrieval scheme.- Privacy
Preservation.- Privacy Preserving Outsourced K-means Clustering using
Kd-tree.- Fuzzy Deduplication Scheme Supporting Pre-verification of Label
Consistency.- A Privacy-Preserving Takeaway Delivery Service
Scheme.- Blockchain Security.- CDRF: A Detection Method of Smart Contract
Vulnerability Based on Random Forest.- simuBits: Pool Security Verification
of Novel Mining Attacks.