- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14-16, 2024.
The 46 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections:
Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking.
Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.
Contents
.- Big data and cloud security.
.- Revocable Registered Attribute-Based Keyword Search Supporting Fairness.
.- HiddenStor: A Steganographic Storage System Built on Secret Sharing.
.- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous.
.- Foundations of Cryptography.
.- On the Relationship between Public Key Primitives via Indifferentiability.
.- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions.
.- From Signature with Re-Randomizable Keys: Generic Construction of PDPKS.
.- Implementation of Cryptosystems.
.- SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework.
.- When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks.
.- Key Exchange.
.- Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy.
.- An Improved Signal Leakage Attack Against DXL Key Exchange Protocol.
.- srCPace: Universally Composable PAKE with Subversion-Resilience.
.- AI and Security.
.- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT.
.- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning.
.- A Binary Code Similarity Detection Method Based on Multi-Source Contrastive Learning.
.- Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement.
.- Security Analysis.
.- Attention-based Decompilation through Neural Machine Translation.
.- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware.
.- Privacy-enhancing technologies.
.- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid.
.- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets.
.- Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy.
.- Watermarking.
.- Public-Key Watermarkable PRFs with Dynamic Bounded Collusion.
.- A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning.
.- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof.