|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Mingwu Zhang , Man Ho Au , Yudi ZhangPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 1st ed. 2023 Volume: 14217 Weight: 0.706kg ISBN: 9783031455124ISBN 10: 3031455126 Pages: 450 Publication Date: 11 October 2023 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsFundamentals & Cryptographic Primitives.- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement.- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.- Cryptanalysis.- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs.- Linear Cryptanalysis of Lightweight Block Cipher WARP.- Linicrypt in the Ideal Cipher Model.- Signature.- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC.- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications.- A Certificateless Aggregate Signature Scheme with Better Security.- Constant-size Group Signatures with Message-Dependent Opening from Lattices.- Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions.- Threshold Ring Signature Scheme from Cryptographic Group Action.- Encryption.- Homomorphic Witness Encryption from Indistinguishable Obfuscation.- Identity-based Matchmaking Encryption Secure against Key Generation Center.- Multi-Input Functional Encryption for Unbounded Inner Products.- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme.- A New Revocable Attribute Based Encryption on Lattice.- An efficient keyword-based ciphertext retrieval scheme.- Privacy Preservation.- Privacy Preserving Outsourced K-means Clustering using Kd-tree.- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency.- A Privacy-Preserving Takeaway Delivery Service Scheme.- Blockchain Security.- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest.- simuBits: Pool Security Verification of Novel Mining Attacks.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |