Muutke küpsiste eelistusi

E-raamat: Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 





The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 





Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.





Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
.- Multi-Party Computation.



.- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party
Computation.



.- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings.



.- Secure Five-party Computation with Private Robustness and Minimal Online
Communication.



.- Model Extraction Attack on MPC Hardened Vertical Federated Learning.



.- Searchable Encryption.



.- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern
Hiding.



.- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption
with Optimized Storage.



.- Encryption.



.- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis
Scheme Using Decentralized Multi-Client Functional Encryption.



.- Ideal Public Key Encryption, Revisited.



.- Simple Construction of PEKS from LWE-based IBE in the Standard Model.



.- Signature.



.- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from
Standard Assumptions.



.- Tightly Secure Identity-based Signature from Cryptographic Group Actions.



.- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way
Signature.



.- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing.



.- Threshold Ring Signatures: From DualRing to the t+1 Rings.



.- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle
Model.