SALE ON NOW! PROMOTIONS

Close Notification

Your cart does not contain any items

Information Security and Cryptology

19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised...

Chunpeng Ge Moti Yung

$163.95   $131.34

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer Nature
26 February 2024
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
Edited by:   ,
Imprint:   Springer Nature
Country of Publication:   Singapore
Edition:   2024 ed.
Volume:   14526
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9789819709410
ISBN 10:   9819709415
Series:   Lecture Notes in Computer Science
Pages:   475
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active
​Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications.- Compact Accountable Ring Signatures in the Plain Model.- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.- Compact Ring Signatures with Post-Quantum Security in Standard Model.- Secure Multi-Party SM2 Signature based on SPDZ Protocol.- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption.- A General Federated Learning Scheme with Blockchain on non-IID Data.- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation.- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources.- Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption.- Full Domain Functional Bootstrapping with Least Significant Bit Encoding.- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication.- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.- Identity-Based Proxy Re-encryption Based on SM9.- Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query.- An Improved Method for Evaluating Secret Variables and Its Application to WAGE.- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection.- XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries.- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.- A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter.- MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection.

See Also