語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security and cryptology ...
~
Inscrypt (Conference) (2024 :)
FindBook
Google Book
Amazon
博客來
Information security and cryptology = 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.. Part I /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information security and cryptology/ edited by Dongdai Lin, Meiqin Wang, Moti Yung.
其他題名:
20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.
其他題名:
Inscrypt 2024
其他作者:
Lin, Dongdai.
團體作者:
Inscrypt (Conference)
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xix, 485 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Big data and cloud security. -- Revocable Registered Attribute-Based Keyword Search Supporting Fairness. -- HiddenStor: A Steganographic Storage System Built on Secret Sharing. -- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous. -- Foundations of Cryptography. -- On the Relationship between Public Key Primitives via Indifferentiability. -- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions. -- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS. -- Implementation of Cryptosystems. -- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework. -- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks. -- Key Exchange. -- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy. -- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol. -- srCPace: Universally Composable PAKE with Subversion-Resilience. -- AI and Security. -- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT. -- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning. -- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning. -- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement. -- Security Analysis. -- Attention-based Decompilation through Neural Machine Translation. -- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware. -- Privacy-enhancing technologies. -- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid. -- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets. -- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy. -- Watermarking. -- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion. -- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning. -- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-4731-6
ISBN:
9789819647316
Information security and cryptology = 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.. Part I /
Information security and cryptology
20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.Part I /[electronic resource] :Inscrypt 2024edited by Dongdai Lin, Meiqin Wang, Moti Yung. - Singapore :Springer Nature Singapore :2025. - xix, 485 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in computer science,155431611-3349 ;. - Lecture notes in computer science ;15543..
Big data and cloud security. -- Revocable Registered Attribute-Based Keyword Search Supporting Fairness. -- HiddenStor: A Steganographic Storage System Built on Secret Sharing. -- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous. -- Foundations of Cryptography. -- On the Relationship between Public Key Primitives via Indifferentiability. -- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions. -- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS. -- Implementation of Cryptosystems. -- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework. -- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks. -- Key Exchange. -- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy. -- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol. -- srCPace: Universally Composable PAKE with Subversion-Resilience. -- AI and Security. -- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT. -- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning. -- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning. -- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement. -- Security Analysis. -- Attention-based Decompilation through Neural Machine Translation. -- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware. -- Privacy-enhancing technologies. -- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid. -- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets. -- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy. -- Watermarking. -- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion. -- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning. -- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14-16, 2024. The 46 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections: Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking. Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.
ISBN: 9789819647316
Standard No.: 10.1007/978-981-96-4731-6doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information security and cryptology = 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.. Part I /
LDR
:04189nmm a2200373 a 4500
001
2409841
003
DE-He213
005
20250503124659.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819647316
$q
(electronic bk.)
020
$a
9789819647309
$q
(paper)
024
7
$a
10.1007/978-981-96-4731-6
$2
doi
035
$a
978-981-96-4731-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I59 2024
111
2
$a
Inscrypt (Conference)
$n
(20th :
$d
2024 :
$c
Kunming, China)
$3
3783334
245
1 0
$a
Information security and cryptology
$h
[electronic resource] :
$b
20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.
$n
Part I /
$c
edited by Dongdai Lin, Meiqin Wang, Moti Yung.
246
3
$a
Inscrypt 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xix, 485 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15543
505
0
$a
Big data and cloud security. -- Revocable Registered Attribute-Based Keyword Search Supporting Fairness. -- HiddenStor: A Steganographic Storage System Built on Secret Sharing. -- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous. -- Foundations of Cryptography. -- On the Relationship between Public Key Primitives via Indifferentiability. -- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions. -- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS. -- Implementation of Cryptosystems. -- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework. -- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks. -- Key Exchange. -- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy. -- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol. -- srCPace: Universally Composable PAKE with Subversion-Resilience. -- AI and Security. -- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT. -- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning. -- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning. -- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement. -- Security Analysis. -- Attention-based Decompilation through Neural Machine Translation. -- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware. -- Privacy-enhancing technologies. -- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid. -- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets. -- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy. -- Watermarking. -- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion. -- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning. -- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
520
$a
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14-16, 2024. The 46 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections: Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking. Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Cryptography
$v
Congresses.
$3
622819
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
890871
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Cryptology.
$3
3382308
700
1
$a
Lin, Dongdai.
$3
1005585
700
1
$a
Wang, Meiqin.
$3
1279028
700
1
$a
Yung, Moti.
$3
840234
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15543.
$3
3783335
856
4 0
$u
https://doi.org/10.1007/978-981-96-4731-6
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9515339
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入