LEADER 01407nam 2200349Ia 450 001 996383524603316 005 20200824132351.0 035 $a(CKB)1000000000586338 035 $a(EEBO)2240925612 035 $a(OCoLC)ocm29626248e 035 $a(OCoLC)29626248 035 $a(EXLCZ)991000000000586338 100 $a19940113d1517 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aBe it knowen to all Criste[n] people, that Syr Iohn Pyllet Eng[lysshe] knyght of the holy sepulcre of Criste co[m]mynge from Iherusalem, was t[aken by the] Mauris & infidels ..$b[electronic resource] 210 $a[S.l. $cR. Pynson$d1517?] 215 $a1 sheet ([1] p.) $cill 300 $aPublisher and date of publication suggested by STC (2nd ed.). 300 $aFormerly STC 7769 (cf. STC 2nd ed.). 300 $aIncludes three illustrations. 300 $aImperfect: cropped and torn, with loss of text. 300 $aReproduction of original in the Society of Antiquaries. 330 $aeebo-0147 606 $aIndulgences 608 $aBroadsides$zEngland$y16th century.$2rbgenr 615 0$aIndulgences. 801 2$bWaOLN 906 $aBOOK 912 $a996383524603316 996 $aBe it knowen to all Criste people, that Syr Iohn Pyllet Englysshe knyght of the holy sepulcre of Criste commynge from Iherusalem, was taken by the Mauris & infidels .$92372166 997 $aUNISA LEADER 04312nam 22007095 450 001 9910983330103321 005 20250201115250.0 010 $a9789819609543 010 $a9819609542 024 7 $a10.1007/978-981-96-0954-3 035 $a(CKB)37447371000041 035 $a(MiAaPQ)EBC31897187 035 $a(Au-PeEL)EBL31897187 035 $a(OCoLC)1496394576 035 $a(DE-He213)978-981-96-0954-3 035 $a(EXLCZ)9937447371000041 100 $a20250201d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProvable and Practical Security $e18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25?27, 2024, Proceedings, Part I /$fedited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (592 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14903 311 08$a9789819609536 311 08$a9819609534 327 $a -- Multi-Party Computation. -- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation. -- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings. -- Secure Five-party Computation with Private Robustness and Minimal Online Communication. -- Model Extraction Attack on MPC Hardened Vertical Federated Learning. -- Searchable Encryption. -- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding. -- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage. -- Encryption. -- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption. -- Ideal Public Key Encryption, Revisited. -- Simple Construction of PEKS from LWE-based IBE in the Standard Model. -- Signature. -- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions. -- Tightly Secure Identity-based Signature from Cryptographic Group Actions. -- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature. -- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing. -- Threshold Ring Signatures: From DualRing to the t+1 Rings. -- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model. 330 $aThis book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. The 26 full papers and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature. Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14903 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aApplication software 606 $aCryptology 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aComputer and Information Systems Applications. 676 $a005.824 700 $aLiu$b Joseph K$0104573 701 $aChen$b Liqun$0720720 701 $aSun$b Shi-Feng$01786165 701 $aLiu$b Xiaoning$01786166 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983330103321 996 $aProvable and Practical Security$94317560 997 $aUNINA