Atnaujinkite slapukų nuostatas

El. knyga: Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 14903
  • Išleidimo metai: 31-Jan-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819609543
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 14903
  • Išleidimo metai: 31-Jan-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819609543

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 





The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 





Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.





Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
.- Multi-Party Computation.



.- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party
Computation.



.- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings.



.- Secure Five-party Computation with Private Robustness and Minimal Online
Communication.



.- Model Extraction Attack on MPC Hardened Vertical Federated Learning.



.- Searchable Encryption.



.- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern
Hiding.



.- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption
with Optimized Storage.



.- Encryption.



.- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis
Scheme Using Decentralized Multi-Client Functional Encryption.



.- Ideal Public Key Encryption, Revisited.



.- Simple Construction of PEKS from LWE-based IBE in the Standard Model.



.- Signature.



.- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from
Standard Assumptions.



.- Tightly Secure Identity-based Signature from Cryptographic Group Actions.



.- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way
Signature.



.- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing.



.- Threshold Ring Signatures: From DualRing to the t+1 Rings.



.- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle
Model.