Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14–16, 2024.   The 46 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections:   Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking.   Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.
1147010847
Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14–16, 2024.   The 46 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections:   Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking.   Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.
189.0 In Stock
Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I

Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I

Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I

Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I

eBook

$189.00 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14–16, 2024.   The 46 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections:   Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking.   Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.

Product Details

ISBN-13: 9789819647316
Publisher: Springer-Verlag New York, LLC
Publication date: 05/02/2025
Series: Lecture Notes in Computer Science , #15543
Sold by: Barnes & Noble
Format: eBook
File size: 51 MB
Note: This product may take a few minutes to download.

Table of Contents

.- Big data and cloud security.
.- Revocable Registered Attribute-Based Keyword Search Supporting Fairness.
.- HiddenStor: A Steganographic Storage System Built on Secret Sharing.
.- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous.
.- Foundations of Cryptography.
.- On the Relationship between Public Key Primitives via Indifferentiability.
.- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions.
.- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS.
.- Implementation of Cryptosystems.
.- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework.
.- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks.
.- Key Exchange.
.- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy.
.- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol.
.- srCPace: Universally Composable PAKE with Subversion-Resilience.
.- AI and Security.
.- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT.
.- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning.
.- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning.
.- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement.
.- Security Analysis.
.- Attention-based Decompilation through Neural Machine Translation.
.- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware.
.- Privacy-enhancing technologies.
.- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid.
.- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets.
.- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy.
.- Watermarking.
.- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion.
.- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning.
.- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.

From the B&N Reads Blog

Customer Reviews