Information Security and Cryptology : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I (Lecture Notes in Computer Science)

個数:

Information Security and Cryptology : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 448 p.
  • 言語 ENG
  • 商品コード 9789819709410

Full Description

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9-10, 2023.
The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.

Contents

​Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications.- Compact Accountable Ring Signatures in the Plain Model.- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.- Compact Ring Signatures with Post-Quantum Security in Standard Model.- Secure Multi-Party SM2 Signature based on SPDZ Protocol.- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption.- A General Federated Learning Scheme with Blockchain on non-IID Data.- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation.- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources.- Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption.- Full Domain Functional Bootstrapping with Least Significant Bit Encoding.- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication.- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.- Identity-Based Proxy Re-encryption Based on SM9.- Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query.- An Improved Method for Evaluating Secret Variables and Its Application to WAGE.- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection.- XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries.- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.- A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter.- MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection.

最近チェックした商品