LOW FLAT RATE $9.90 AUST-WIDE DELIVERY

Close Notification

Your cart does not contain any items

Provable and Practical Security

18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024,...

Joseph K. Liu Liqun Chen Shi-Feng Sun Xiaoning Liu

$125.95   $100.80

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer Nature Switzerland AG
01 February 2025
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 

The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 

Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.

Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
Edited by:   , , ,
Imprint:   Springer Nature Switzerland AG
Country of Publication:   Switzerland
Volume:   14904
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9789819609567
ISBN 10:   9819609569
Series:   Lecture Notes in Computer Science
Pages:   312
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active
.- Tight Security. .- Efficient Variants of TNT with BBB Security. .- ROM Reduction Failures: Reasons and Solutions. .- Quantum-Safe Cryptography. .- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials. .- Semi-Compressed CRYSTALS-Kyber. .- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security. .- Distributed System and Blockchain Security. .- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph. .- PDTS: Practical Data Trading Scheme in Distributed Environments. .- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function. .- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping. .- Key Exchange and Privacy. .- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls. .- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming.

See Also