Muutke küpsiste eelistusi

Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 2527, 2024, Proceedings, Part II [Pehme köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 312 pages, kõrgus x laius: 235x155 mm, 22 Illustrations, color; 25 Illustrations, black and white; XVI, 312 p. 47 illus., 22 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 14904
  • Ilmumisaeg: 01-Feb-2025
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 9819609569
  • ISBN-13: 9789819609567
  • Pehme köide
  • Hind: 56,11 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 66,01 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 312 pages, kõrgus x laius: 235x155 mm, 22 Illustrations, color; 25 Illustrations, black and white; XVI, 312 p. 47 illus., 22 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 14904
  • Ilmumisaeg: 01-Feb-2025
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 9819609569
  • ISBN-13: 9789819609567
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 





The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 





Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.





Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
.- Tight Security.



.- Efficient Variants of TNT with BBB Security.



.- ROM Reduction Failures: Reasons and Solutions.



.- Quantum-Safe Cryptography.



.- BDEC: Enhancing Learning Credibility via Post-Quantum Digital
Credentials.



.- Semi-Compressed CRYSTALS-Kyber.



.- Blocklistable Anonymous Credential for Circuits with Post-Quantum
Security.



.- Distributed System and Blockchain Security.



.- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on
Directed Acyclic Graph.



.- PDTS: Practical Data Trading Scheme in Distributed Environments.



.- Communication-Efficient Secure Neural Network via Key-Reduced Distributed
Comparison Function.



.- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping.



.- Key Exchange and Privacy.



.- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.



.- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic
Programming.



.- Short Papers.



.- SePEnTra: A secure and privacy-preserving energy trading mechanism in the
transactive energy market.



.- On Multi-user Security of Lattice-based Signature under Adaptive
Corruptions and Key Leakages.



.- Reusable Fuzzy Extractor from Isogeny.



.- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart
Contracts.



.- DPAC: A New Data-centric Privacy-preserving Access Control Model.



.- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum.



.- A2V: Anonymous and Accountable Voting Framework via Blockchain.



.- Quantum Safe Computation-friendly Identity-binding Password Authenticated
Key Exchange.