Atnaujinkite slapukų nuostatas

El. knyga: Provable and Practical Security: 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings

Edited by , Edited by
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 13600
  • Išleidimo metai: 07-Nov-2022
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031209178
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 13600
  • Išleidimo metai: 07-Nov-2022
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031209178

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022. 

 The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.
Encryption.- A Generic Construction of CCA-secure Attribute-based
Encryption with Equality Test.- Secure-Channel Free Certificateless
Searchable Public key Authenticated Encryption with Keyword Search.- More
Efficient Verifiable Functional Encryption.- Subverting Deniability.- Epoch
Confidentiality in Updatable Encryption.- Lattice Based
Cryptography.- Simplified Server-Aided Revocable Identity-Based Encryption
from Lattices.- Lattice-based Public Key Cryptosystems invoking Linear
Mapping Mask.- Batched Fully Dynamic Multi-key FHE from FHEW-like
Cryptosystems.- Zero-knowledge Range Arguments for Signed Fractional Numbers
from Lattices.- Information Security.- Fast Out-of-band Data Integrity
Monitor to Mitigate Memory Corruption Attacks.- Construction of a New UAV
Management System based on UMIA Technology.- FP2-MIA: A Membership Inference
Attack Free of Posterior Probability in Machine Unlearning.- Practical
Federated Learning for Samples with Different
IDs.- Blockchain.- Reinforcement-Mining: Protecting Reward in Selfish
Mining.- FolketID: A Decentralized Blockchain-based NemID Alternative against
DDosS Attacks.- Secure Collaboration between Consortiums in Permissioned
Blockchains.- Foundations.- (Public) Verifiability For Composable Protocols
Without Adaptivity Or Zero-Knowledge.- Practical Non-Malleable Codes from
Symmetric-key Primitives in 2-Split-State Model.- Cryptographic Role-Based
Access Control, Reconsidered.