Atnaujinkite slapukų nuostatas

El. knyga: Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part II

Edited by , Edited by , Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 14904
  • Išleidimo metai: 30-Jan-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819609574
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 14904
  • Išleidimo metai: 30-Jan-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819609574

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 





The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 





Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.





Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
.- Tight Security.



.- Efficient Variants of TNT with BBB Security.



.- ROM Reduction Failures: Reasons and Solutions.



.- Quantum-Safe Cryptography.



.- BDEC: Enhancing Learning Credibility via Post-Quantum Digital
Credentials.



.- Semi-Compressed CRYSTALS-Kyber.



.- Blocklistable Anonymous Credential for Circuits with Post-Quantum
Security.



.- Distributed System and Blockchain Security.



.- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on
Directed Acyclic Graph.



.- PDTS: Practical Data Trading Scheme in Distributed Environments.



.- Communication-Efficient Secure Neural Network via Key-Reduced Distributed
Comparison Function.



.- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping.



.- Key Exchange and Privacy.



.- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.



.- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic
Programming.



.- Short Papers.



.- SePEnTra: A secure and privacy-preserving energy trading mechanism in the
transactive energy market.



.- On Multi-user Security of Lattice-based Signature under Adaptive
Corruptions and Key Leakages.



.- Reusable Fuzzy Extractor from Isogeny.



.- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart
Contracts.



.- DPAC: A New Data-centric Privacy-preserving Access Control Model.



.- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum.



.- A2V: Anonymous and Accountable Voting Framework via Blockchain.



.- Quantum Safe Computation-friendly Identity-binding Password Authenticated
Key Exchange.