000 | 04782nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-45513-1 | ||
003 | DE-He213 | ||
005 | 20240730201047.0 | ||
007 | cr nn 008mamaa | ||
008 | 231010s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031455131 _9978-3-031-45513-1 |
||
024 | 7 |
_a10.1007/978-3-031-45513-1 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aProvable and Practical Security _h[electronic resource] : _b17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings / _cedited by Mingwu Zhang, Man Ho Au, Yudi Zhang. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXIII, 450 p. 89 illus., 54 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14217 |
|
505 | 0 | _aFundamentals & Cryptographic Primitives -- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement -- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation -- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections -- Cryptanalysis -- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs -- Linear Cryptanalysis of Lightweight Block Cipher WARP -- Linicrypt in the Ideal Cipher Model -- Signature -- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC -- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications -- A Certificateless Aggregate Signature Scheme with Better Security -- Constant-size Group Signatures with Message-Dependent Opening from Lattices -- Post-quantum SigmaProtocols and Signatures from Low-Rank Matrix Completions -- Threshold Ring Signature Scheme from Cryptographic Group Action -- Encryption -- Homomorphic Witness Encryption from Indistinguishable Obfuscation -- Identity-based Matchmaking Encryption Secure against Key Generation Center -- Multi-Input Functional Encryption for Unbounded Inner Products -- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme -- A New Revocable Attribute Based Encryption on Lattice -- An efficient keyword-based ciphertext retrieval scheme -- Privacy Preservation -- Privacy Preserving Outsourced K-means Clustering using Kd-tree -- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency -- A Privacy-Preserving Takeaway Delivery Service Scheme -- Blockchain Security -- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest -- simuBits: Pool Security Verification of Novel Mining Attacks. | |
520 | _aThis volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aApplication software. _9165904 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9165905 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9165906 |
700 | 1 |
_aZhang, Mingwu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9165907 |
|
700 | 1 |
_aAu, Man Ho. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9165908 |
|
700 | 1 |
_aZhang, Yudi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9165909 |
|
710 | 2 |
_aSpringerLink (Online service) _9165910 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031455124 |
776 | 0 | 8 |
_iPrinted edition: _z9783031455148 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14217 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-45513-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96360 _d96360 |