Information Security and Cryptology (Record no. 87551)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05356nam a22006735i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-97-0942-7 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730171401.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240225s2024 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789819709427 |
-- | 978-981-97-0942-7 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Information Security and Cryptology |
Sub Title | 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVII, 475 p. 112 illus., 71 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications -- Compact Accountable Ring Signatures in the Plain Model -- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key -- Compact Ring Signatures with Post-Quantum Security in Standard Model -- Secure Multi-Party SM2 Signature based on SPDZ Protocol -- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption -- A General Federated Learning Scheme with Blockchain on non-IID Data -- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation -- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources -- Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption -- Full Domain Functional Bootstrapping with Least Significant Bit Encoding -- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication -- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications -- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction -- Identity-Based Proxy Re-encryption Based on SM9 -- Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query -- An Improved Method for Evaluating Secret Variables and Its Application to WAGE -- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection -- XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries -- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement -- A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter -- MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection. |
520 ## - SUMMARY, ETC. | |
Summary, etc | The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9-10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Digital techniques. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Ge, Chunpeng. |
700 1# - AUTHOR 2 | |
Author 2 | Yung, Moti. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-97-0942-7 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Image processing |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer vision. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Application software. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Imaging, Vision, Pattern Recognition and Graphics. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer and Information Systems Applications. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Mobile and Network Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptology. |
700 1# - AUTHOR 2 | |
-- | (orcid) |
-- | 0000-0003-0848-0873 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1611-3349 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.