LEADER 01626nas 2200421 n 450 001 990009025880403321 005 20240229084540.0 011 $a0277-5387 035 $a000902588 035 $aFED01000902588 035 $a(Aleph)000902588FED01 035 $a000902588 091 $2CNR$aP 00028433 100 $a20161109a19829999km-y0itaa50------ba 101 0 $aeng 102 $aGB 110 $aauu-------- 200 1 $aPolyhedron 207 1$a1982- 210 $aOxford$cPergamom Press 326 $aMensile 436 0$1001000898974$12001$aJournal of inorganic and nuclear chemistry 436 0$1001000897867$12001$aInorganic and nuclear chemistry letters 452 0$12001$aPolyhedron 530 0 $aPolyhedron 675 $a539.172 675 $a541.28 676 $a546/.05 801 0$aIT$bACNP$c20090723 859 4 $uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/dc-p1.tcl?catno=18800&person=false&language=ITALIANO&libr=&libr_th=unina1$zBiblioteche che possiedono il periodico 901 $aSE 912 $a990009025880403321 958 $aBiblioteca. Dipartimento di Chimica. Complesso Universitario di Monte S. Angelo.$b1982-1997;$fDCH 959 $aDCH 996 $aPolyhedron$9789721 997 $aUNINA AP1 8 $6866-01$aNA007 Biblioteca. Dipartimento di Chimica. Complesso Universitario di Monte S. Angelo.$evia Cinthia 4, 80126 Napoli (NA)$m081674497-081674488$m081674090$nit AP2 40$aacnp.cib.unibo.it$nACNP Italian Union Catalogue of Serials$uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/df-p.tcl?catno=18800&language=ITALIANO&libr=&person=&B=1&libr_th=unina&proposto=NO LEADER 04403nam 22007215 450 001 9910624307603321 005 20251225202000.0 010 $a9783031209178 010 $a3031209176 024 7 $a10.1007/978-3-031-20917-8 035 $a(MiAaPQ)EBC7132880 035 $a(Au-PeEL)EBL7132880 035 $a(CKB)25299342000041 035 $a(PPN)266348580 035 $a(BIP)86308775 035 $a(BIP)85922479 035 $a(DE-He213)978-3-031-20917-8 035 $a(EXLCZ)9925299342000041 100 $a20221104d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProvable and Practical Security $e16th International Conference, ProvSec 2022, Nanjing, China, November 11?12, 2022, Proceedings /$fedited by Chunpeng Ge, Fuchun Guo 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (292 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13600 300 $aIncludes index. 311 08$aPrint version: Ge, Chunpeng Provable and Practical Security Cham : Springer,c2022 9783031209161 327 $aEncryption -- A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test -- Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search -- More Efficient Verifiable Functional Encryption -- Subverting Deniability -- Epoch Confidentiality in Updatable Encryption -- Lattice Based Cryptography -- Simplified Server-Aided Revocable Identity-Based Encryption from Lattices -- Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask -- Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems -- Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices -- Information Security -- Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks -- Construction of a New UAV Management System based on UMIA Technology -- FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning -- Practical Federated Learning for Samples with Different IDs -- Blockchain -- Reinforcement-Mining: Protecting Reward in Selfish Mining -- FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks -- Secure Collaboration between Consortiums in Permissioned Blockchains -- Foundations -- (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge -- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model -- Cryptographic Role-Based Access Control, Reconsidered. 330 $aThis book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11?12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13600 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aApplication software 606 $aCryptology 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aComputer and Information Systems Applications. 676 $a016.391 676 $a005.8 702 $aGe$b Chunpeng 702 $aGuo$b Fuchun 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910624307603321 996 $aProvable and practical security$92113467 997 $aUNINA