Browse Subject Headings
Information Security and Cryptology : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I
Information Security and Cryptology : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I
Click to enlarge
ISBN No.: 9789819709410
Pages: xvii, 475
Year: 202402
Format: Trade Paper
Price: $ 110.39
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications.- Compact Accountable Ring Signatures in the Plain Model.- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.- Compact Ring Signatures with Post-Quantum Security in Standard Model.- Secure Multi-Party SM2 Signature based on SPDZ Protocol.- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption.- A General Federated Learning Scheme with Blockchain on non-IID Data.- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation.


- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources.- Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption.- Full Domain Functional Bootstrapping with Least Significant Bit Encoding.- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication.- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.- Identity-Based Proxy Re-encryption Based on SM9.


- Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query.- An Improved Method for Evaluating Secret Variables and Its Application to WAGE.- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection.- XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries.- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.- A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter.- MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings