Skip to:Content
|
Bottom
Provable and Practical Security 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings için kapak resmi
Başlık:
Provable and Practical Security 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings
Yazar:
Zhang, Mingwu. editor.
ISBN:
9783031455131
Basım Bilgisi:
1st ed. 2023.
Fiziksel Tanımlama:
XIII, 450 p. 89 illus., 54 illus. in color. online resource.
Seri:
Lecture Notes in Computer Science, 14217
İçerik:
Fundamentals & Cryptographic Primitives -- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement -- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation -- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections -- Cryptanalysis -- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs -- Linear Cryptanalysis of Lightweight Block Cipher WARP -- Linicrypt in the Ideal Cipher Model -- Signature -- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC -- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications -- A Certificateless Aggregate Signature Scheme with Better Security -- Constant-size Group Signatures with Message-Dependent Opening from Lattices -- Post-quantum SigmaProtocols and Signatures from Low-Rank Matrix Completions -- Threshold Ring Signature Scheme from Cryptographic Group Action -- Encryption -- Homomorphic Witness Encryption from Indistinguishable Obfuscation -- Identity-based Matchmaking Encryption Secure against Key Generation Center -- Multi-Input Functional Encryption for Unbounded Inner Products -- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme -- A New Revocable Attribute Based Encryption on Lattice -- An efficient keyword-based ciphertext retrieval scheme -- Privacy Preservation -- Privacy Preserving Outsourced K-means Clustering using Kd-tree -- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency -- A Privacy-Preserving Takeaway Delivery Service Scheme -- Blockchain Security -- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest -- simuBits: Pool Security Verification of Novel Mining Attacks.
Tüzel Kişi Ek Girişi:
Ayırtma:
Kopya:

Rafta:*

Kütüphane
Materyal Türü
Demirbaş Numarası
Yer Numarası
Durumu/İade Tarihi
Materyal Ayırtma
Arıyor...
E-Kitap 521233-1001 XX(521233.1)
Arıyor...

On Order

Go to:Top of Page