Provable and Practical Security
17th International Conference, ProvSec 2023, Wuhan, China, October 20¿22, 2023, Proceedings
Herausgegeben:Zhang, Mingwu; Au, Man Ho; Zhang, Yudi
Provable and Practical Security
17th International Conference, ProvSec 2023, Wuhan, China, October 20¿22, 2023, Proceedings
Herausgegeben:Zhang, Mingwu; Au, Man Ho; Zhang, Yudi
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023.
The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
Andere Kunden interessierten sich auch für
- Provable and Practical Security69,54 €
- Provable and Practical Security55,99 €
- Provable and Practical Security37,99 €
- Advances in Cryptology ¿ ASIACRYPT 202288,99 €
- Theory of Cryptography81,99 €
- Information Security and Cryptology ¿ ICISC 202266,99 €
- Advances in Cryptology ¿ ASIACRYPT 202274,99 €
-
-
-
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023.
The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 14217
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-45512-4
- 1st ed. 2023
- Seitenzahl: 464
- Erscheinungstermin: 11. Oktober 2023
- Englisch
- Abmessung: 235mm x 155mm x 25mm
- Gewicht: 698g
- ISBN-13: 9783031455124
- ISBN-10: 3031455126
- Artikelnr.: 68790547
- Lecture Notes in Computer Science 14217
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-45512-4
- 1st ed. 2023
- Seitenzahl: 464
- Erscheinungstermin: 11. Oktober 2023
- Englisch
- Abmessung: 235mm x 155mm x 25mm
- Gewicht: 698g
- ISBN-13: 9783031455124
- ISBN-10: 3031455126
- Artikelnr.: 68790547
Fundamentals & Cryptographic Primitives.- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement.- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.- Cryptanalysis.- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs.- Linear Cryptanalysis of Lightweight Block Cipher WARP.- Linicrypt in the Ideal Cipher Model.- Signature.- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC.- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications.- A Certificateless Aggregate Signature Scheme with Better Security.- Constant-size Group Signatures with Message-Dependent Opening from Lattices.- Post-quantum SigmaProtocols and Signatures from Low-Rank Matrix Completions.- Threshold Ring Signature Scheme from Cryptographic Group Action.- Encryption.- Homomorphic Witness Encryption from Indistinguishable Obfuscation.- Identity-based Matchmaking Encryption Secure against Key Generation Center.- Multi-Input Functional Encryption for Unbounded Inner Products.- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme.- A New Revocable Attribute Based Encryption on Lattice.- An efficient keyword-based ciphertext retrieval scheme.- Privacy Preservation.- Privacy Preserving Outsourced K-means Clustering using Kd-tree.- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency.- A Privacy-Preserving Takeaway Delivery Service Scheme.- Blockchain Security.- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest.- simuBits: Pool Security Verification of Novel Mining Attacks.
Fundamentals & Cryptographic Primitives.- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement.- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.- Cryptanalysis.- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs.- Linear Cryptanalysis of Lightweight Block Cipher WARP.- Linicrypt in the Ideal Cipher Model.- Signature.- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC.- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications.- A Certificateless Aggregate Signature Scheme with Better Security.- Constant-size Group Signatures with Message-Dependent Opening from Lattices.- Post-quantum SigmaProtocols and Signatures from Low-Rank Matrix Completions.- Threshold Ring Signature Scheme from Cryptographic Group Action.- Encryption.- Homomorphic Witness Encryption from Indistinguishable Obfuscation.- Identity-based Matchmaking Encryption Secure against Key Generation Center.- Multi-Input Functional Encryption for Unbounded Inner Products.- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme.- A New Revocable Attribute Based Encryption on Lattice.- An efficient keyword-based ciphertext retrieval scheme.- Privacy Preservation.- Privacy Preserving Outsourced K-means Clustering using Kd-tree.- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency.- A Privacy-Preserving Takeaway Delivery Service Scheme.- Blockchain Security.- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest.- simuBits: Pool Security Verification of Novel Mining Attacks.