This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26–28, 2024.
The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions.
The papers are organized in the following topical sections:
Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation.
Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.
Edited by:
Biwen Chen, Xinwen Fu, Min Huang Imprint: Springer Nature Switzerland AG Country of Publication: Switzerland Edition: 2025 ed. Volume: 2316 Dimensions:
Height: 235mm,
Width: 155mm,
ISBN:9789819601530 ISBN 10: 9819601533 Series:Communications in Computer and Information Science Pages: 273 Publication Date:27 December 2024 Audience:
Professional and scholarly
,
Undergraduate
Format:Paperback Publisher's Status: Active
.- Multi-Party Computation. .- A Semi-Centralized Dynamic Session Key Agreement Protocol based on CL-PKC for In-vehicle Network. .- A Novel Multi-user Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things. .- Practical Third-party Private Set Intersection Protocol from Homomorphic Encryption. .- Smart Grid. .- A Multidimensional Data Aggregation Scheme with Anonymous and Demand-response Billing. .- Achieving Secure and Efficient Multi-layer Data Sharing for Smart Grid. .- Vulnerability Detection for Open Source Components in Smart Power Grid. .- Addressing Economic Dispatch Problem in a Smart Grid: A Privacy-Preserving and Distributed Optimization Approach. .- A Multi-Dimensional Data Aggregation Signcryption Scheme with Anonymity in the Smart Grid. .- Authentication and Deduplication. .- A Novel Anonymous Authentication Key Agreement Protocol in Satellite Terrestrial Networks. .- An Asynchronous Group Key Exchange Protocol with Threshold Join Function for Internet of Vehicles. .- A PUF-based Lightweight Mutual Authentication Scheme for IoT Devices. .- BFDup: Batch Fuzzy Deduplication Scheme for Massive Data in Non-trusted Environments. .- Secure Encrypted Deduplication Based on Frequency Distribution. .- Enhanced IoT Security: A Blockchain and Chameleon Hashing-Based Scheme for Authentication. .- A Blockchain-based Anonymous Authentication Scheme for Medical Security.