Fr. 81.00

Provable and Practical Security - 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part II

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 
The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 
Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.
Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy

List of contents

.- Tight Security.
.- Efficient Variants of TNT with BBB Security.
.- ROM Reduction Failures: Reasons and Solutions.
.- Quantum-Safe Cryptography.
.- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials.
.- Semi-Compressed CRYSTALS-Kyber.
.- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security.
.- Distributed System and Blockchain Security.
.- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph.
.- PDTS: Practical Data Trading Scheme in Distributed Environments.
.- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function.
.- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping.
.- Key Exchange and Privacy.
.- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.
.- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming.
.- Short Papers.
.- SePEnTra: A secure and privacy-preserving energy trading mechanism in the transactive energy market.
.- On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages.
.- Reusable Fuzzy Extractor from Isogeny.
.- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts.
.- DPAC: A New Data-centric Privacy-preserving Access Control Model.
.- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum.
.- A2V: Anonymous and Accountable Voting Framework via Blockchain.
.- Quantum Safe Computation-friendly Identity-binding Password Authenticated Key Exchange.

Product details

Assisted by Liqun Chen (Editor), Joseph K. Liu (Editor), Xiaoning Liu (Editor), Shi-Feng Sun (Editor), Shi-Feng Sun et al (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 15.02.2025
 
EAN 9789819609567
ISBN 978-981-9609-56-7
No. of pages 312
Dimensions 155 mm x 17 mm x 235 mm
Weight 499 g
Illustrations XVI, 312 p. 47 illus., 22 illus. in color.
Series Lecture Notes in Computer Science
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.