Skip to:Content
|
Bottom
Cover image for Provable and Practical Security 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings
Title:
Provable and Practical Security 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings
Author:
Zhang, Mingwu. editor.
ISBN:
9783031455131
Edition:
1st ed. 2023.
Physical Description:
XIII, 450 p. 89 illus., 54 illus. in color. online resource.
Series:
Lecture Notes in Computer Science, 14217
Contents:
Fundamentals & Cryptographic Primitives -- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement -- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation -- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections -- Cryptanalysis -- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs -- Linear Cryptanalysis of Lightweight Block Cipher WARP -- Linicrypt in the Ideal Cipher Model -- Signature -- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC -- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications -- A Certificateless Aggregate Signature Scheme with Better Security -- Constant-size Group Signatures with Message-Dependent Opening from Lattices -- Post-quantum SigmaProtocols and Signatures from Low-Rank Matrix Completions -- Threshold Ring Signature Scheme from Cryptographic Group Action -- Encryption -- Homomorphic Witness Encryption from Indistinguishable Obfuscation -- Identity-based Matchmaking Encryption Secure against Key Generation Center -- Multi-Input Functional Encryption for Unbounded Inner Products -- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme -- A New Revocable Attribute Based Encryption on Lattice -- An efficient keyword-based ciphertext retrieval scheme -- Privacy Preservation -- Privacy Preserving Outsourced K-means Clustering using Kd-tree -- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency -- A Privacy-Preserving Takeaway Delivery Service Scheme -- Blockchain Security -- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest -- simuBits: Pool Security Verification of Novel Mining Attacks.
Added Corporate Author:
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 521233-1001 XX(521233.1)
Searching...

On Order

Go to:Top of Page