Information security and cryptology ...
Inscrypt (Conference) (2024 :)

FindBook      Google Book      Amazon      博客來     
  • Information security and cryptology = 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.. Part I /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security and cryptology/ edited by Dongdai Lin, Meiqin Wang, Moti Yung.
    其他題名: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.
    其他題名: Inscrypt 2024
    其他作者: Lin, Dongdai.
    團體作者: Inscrypt (Conference)
    出版者: Singapore :Springer Nature Singapore : : 2025.,
    面頁冊數: xix, 485 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Big data and cloud security. -- Revocable Registered Attribute-Based Keyword Search Supporting Fairness. -- HiddenStor: A Steganographic Storage System Built on Secret Sharing. -- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous. -- Foundations of Cryptography. -- On the Relationship between Public Key Primitives via Indifferentiability. -- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions. -- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS. -- Implementation of Cryptosystems. -- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework. -- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks. -- Key Exchange. -- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy. -- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol. -- srCPace: Universally Composable PAKE with Subversion-Resilience. -- AI and Security. -- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT. -- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning. -- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning. -- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement. -- Security Analysis. -- Attention-based Decompilation through Neural Machine Translation. -- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware. -- Privacy-enhancing technologies. -- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid. -- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets. -- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy. -- Watermarking. -- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion. -- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning. -- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-96-4731-6
    ISBN: 9789819647316
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入