Information security and cryptology ...
Inscrypt (Conference) (2024 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security and cryptology = 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.. Part I /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security and cryptology/ edited by Dongdai Lin, Meiqin Wang, Moti Yung.
    Reminder of title: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.
    remainder title: Inscrypt 2024
    other author: Lin, Dongdai.
    corporate name: Inscrypt (Conference)
    Published: Singapore :Springer Nature Singapore : : 2025.,
    Description: xix, 485 p. :ill. (chiefly color), digital ;24 cm.
    [NT 15003449]: Big data and cloud security. -- Revocable Registered Attribute-Based Keyword Search Supporting Fairness. -- HiddenStor: A Steganographic Storage System Built on Secret Sharing. -- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous. -- Foundations of Cryptography. -- On the Relationship between Public Key Primitives via Indifferentiability. -- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions. -- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS. -- Implementation of Cryptosystems. -- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework. -- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks. -- Key Exchange. -- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy. -- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol. -- srCPace: Universally Composable PAKE with Subversion-Resilience. -- AI and Security. -- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT. -- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning. -- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning. -- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement. -- Security Analysis. -- Attention-based Decompilation through Neural Machine Translation. -- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware. -- Privacy-enhancing technologies. -- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid. -- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets. -- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy. -- Watermarking. -- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion. -- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning. -- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-96-4731-6
    ISBN: 9789819647316
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login