Information Security and Cryptology
Information Security and Cryptology
20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I
Wang, Meiqin; Lin, Dongdai; Yung, Moti
Springer Nature Switzerland AG
05/2025
458
Mole
Inglês
9789819647309
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
.- Big data and cloud security.
.- Revocable Registered Attribute-Based Keyword Search Supporting Fairness.
.- HiddenStor: A Steganographic Storage System Built on Secret Sharing.
.- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous.
.- Foundations of Cryptography.
.- On the Relationship between Public Key Primitives via Indifferentiability.
.- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions.
.- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS.
.- Implementation of Cryptosystems.
.- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework.
.- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks.
.- Key Exchange.
.- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy.
.- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol.
.- srCPace: Universally Composable PAKE with Subversion-Resilience.
.- AI and Security.
.- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT.
.- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning.
.- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning.
.- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement.
.- Security Analysis.
.- Attention-based Decompilation through Neural Machine Translation.
.- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware.
.- Privacy-enhancing technologies.
.- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid.
.- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets.
.- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy.
.- Watermarking.
.- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion.
.- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning.
.- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
.- Revocable Registered Attribute-Based Keyword Search Supporting Fairness.
.- HiddenStor: A Steganographic Storage System Built on Secret Sharing.
.- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous.
.- Foundations of Cryptography.
.- On the Relationship between Public Key Primitives via Indifferentiability.
.- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions.
.- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS.
.- Implementation of Cryptosystems.
.- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework.
.- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks.
.- Key Exchange.
.- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy.
.- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol.
.- srCPace: Universally Composable PAKE with Subversion-Resilience.
.- AI and Security.
.- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT.
.- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning.
.- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning.
.- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement.
.- Security Analysis.
.- Attention-based Decompilation through Neural Machine Translation.
.- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware.
.- Privacy-enhancing technologies.
.- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid.
.- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets.
.- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy.
.- Watermarking.
.- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion.
.- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning.
.- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Big data and cloud security;Foundations of Cryptography;Key Exchange;Implementation of Cryptosystems;AI and Security;Security Analysis;Privacy-enhancing technologies;Public Key Cryptosystems;Security Protocols Analysis;Symmetric Cryptanalysis;Watermarking;Quantum and Post Quantum Cryptography
.- Big data and cloud security.
.- Revocable Registered Attribute-Based Keyword Search Supporting Fairness.
.- HiddenStor: A Steganographic Storage System Built on Secret Sharing.
.- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous.
.- Foundations of Cryptography.
.- On the Relationship between Public Key Primitives via Indifferentiability.
.- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions.
.- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS.
.- Implementation of Cryptosystems.
.- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework.
.- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks.
.- Key Exchange.
.- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy.
.- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol.
.- srCPace: Universally Composable PAKE with Subversion-Resilience.
.- AI and Security.
.- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT.
.- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning.
.- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning.
.- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement.
.- Security Analysis.
.- Attention-based Decompilation through Neural Machine Translation.
.- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware.
.- Privacy-enhancing technologies.
.- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid.
.- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets.
.- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy.
.- Watermarking.
.- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion.
.- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning.
.- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
.- Revocable Registered Attribute-Based Keyword Search Supporting Fairness.
.- HiddenStor: A Steganographic Storage System Built on Secret Sharing.
.- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous.
.- Foundations of Cryptography.
.- On the Relationship between Public Key Primitives via Indifferentiability.
.- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions.
.- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS.
.- Implementation of Cryptosystems.
.- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework.
.- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks.
.- Key Exchange.
.- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy.
.- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol.
.- srCPace: Universally Composable PAKE with Subversion-Resilience.
.- AI and Security.
.- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT.
.- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning.
.- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning.
.- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement.
.- Security Analysis.
.- Attention-based Decompilation through Neural Machine Translation.
.- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware.
.- Privacy-enhancing technologies.
.- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid.
.- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets.
.- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy.
.- Watermarking.
.- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion.
.- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning.
.- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.