| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
Information security and cryptology/ edited by Dongdai Lin, Meiqin Wang, Moti Yung. |
| Reminder of title: |
20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers. |
| remainder title: |
Inscrypt 2024 |
| other author: |
Lin, Dongdai. |
| corporate name: |
Inscrypt (Conference) |
| Published: |
Singapore :Springer Nature Singapore : : 2025., |
| Description: |
xix, 485 p. :ill. (chiefly color), digital ;24 cm. |
| [NT 15003449]: |
Big data and cloud security. -- Revocable Registered Attribute-Based Keyword Search Supporting Fairness. -- HiddenStor: A Steganographic Storage System Built on Secret Sharing. -- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous. -- Foundations of Cryptography. -- On the Relationship between Public Key Primitives via Indifferentiability. -- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions. -- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS. -- Implementation of Cryptosystems. -- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework. -- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks. -- Key Exchange. -- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy. -- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol. -- srCPace: Universally Composable PAKE with Subversion-Resilience. -- AI and Security. -- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT. -- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning. -- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning. -- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement. -- Security Analysis. -- Attention-based Decompilation through Neural Machine Translation. -- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware. -- Privacy-enhancing technologies. -- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid. -- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets. -- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy. -- Watermarking. -- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion. -- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning. -- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer security - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-981-96-4731-6 |
| ISBN: |
9789819647316 |