Privacy Enhancing Techniques : Practices and Applications / / by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino
| Privacy Enhancing Techniques : Practices and Applications / / by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino |
| Autore | Yi Xun |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (367 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) |
YangXuechao
LiuXiaoning KelarevAndrei LamKwok-Yan YangMengmeng WangXiangning BertinoElisa |
| Soggetto topico |
Data protection - Law and legislation
Data mining Machine learning Privacy Data Mining and Knowledge Discovery Machine Learning |
| ISBN | 3-031-95140-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Introduction -- Chapter 2: Homomorphic Encryption -- Chapter 3: Multiparty Computation -- Chapter 4: Differential Privacy -- Chapter 5: Privacy-Preserving Data Mining -- Chapter 6: Privacy-Preserving Machine Learning -- Chapter 7: Privacy-Preserving Social Networks -- Chapter 8: Privacy-Preserving Location-Based Services -- Chapter 9: Privacy and Digital Trust -- Chapter 10: Conclusion. |
| Record Nr. | UNINA-9911015687303321 |
Yi Xun
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
| Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu |
| Autore | Liu Joseph K |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (592 pages) |
| Disciplina | 005.824 |
| Altri autori (Persone) |
ChenLiqun
SunShi-Feng LiuXiaoning |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer networks - Security measures Application software Cryptology Computer Communication Networks Mobile and Network Security Computer and Information Systems Applications |
| ISBN |
9789819609543
9819609542 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Multi-Party Computation. -- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation. -- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings. -- Secure Five-party Computation with Private Robustness and Minimal Online Communication. -- Model Extraction Attack on MPC Hardened Vertical Federated Learning. -- Searchable Encryption. -- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding. -- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage. -- Encryption. -- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption. -- Ideal Public Key Encryption, Revisited. -- Simple Construction of PEKS from LWE-based IBE in the Standard Model. -- Signature. -- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions. -- Tightly Secure Identity-based Signature from Cryptographic Group Actions. -- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature. -- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing. -- Threshold Ring Signatures: From DualRing to the t+1 Rings. -- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model. |
| Record Nr. | UNINA-9910983330103321 |
Liu Joseph K
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
| Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu |
| Autore | Liu Joseph K |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (592 pages) |
| Disciplina | 005.824 |
| Altri autori (Persone) |
ChenLiqun
SunShi-Feng LiuXiaoning |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer networks - Security measures Application software Cryptology Computer Communication Networks Mobile and Network Security Computer and Information Systems Applications |
| ISBN |
9789819609543
9819609542 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Multi-Party Computation. -- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation. -- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings. -- Secure Five-party Computation with Private Robustness and Minimal Online Communication. -- Model Extraction Attack on MPC Hardened Vertical Federated Learning. -- Searchable Encryption. -- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding. -- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage. -- Encryption. -- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption. -- Ideal Public Key Encryption, Revisited. -- Simple Construction of PEKS from LWE-based IBE in the Standard Model. -- Signature. -- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions. -- Tightly Secure Identity-based Signature from Cryptographic Group Actions. -- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature. -- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing. -- Threshold Ring Signatures: From DualRing to the t+1 Rings. -- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model. |
| Record Nr. | UNISA-996647867803316 |
Liu Joseph K
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part II / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
| Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part II / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVI, 312 p. 47 illus., 22 illus. in color.) |
| Disciplina | 005.824 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer networks - Security measures Application software Cryptology Computer Communication Networks Mobile and Network Security Computer and Information Systems Applications |
| ISBN |
9789819609574
9819609577 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Tight Security. -- Efficient Variants of TNT with BBB Security. -- ROM Reduction Failures: Reasons and Solutions. -- Quantum-Safe Cryptography. -- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials. -- Semi-Compressed CRYSTALS-Kyber. -- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security. -- Distributed System and Blockchain Security. -- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph. -- PDTS: Practical Data Trading Scheme in Distributed Environments. -- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function. -- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping. -- Key Exchange and Privacy. -- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls. -- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming. -- Short Papers. -- SePEnTra: A secure and privacy-preserving energy trading mechanism in the transactive energy market. -- On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages. -- Reusable Fuzzy Extractor from Isogeny. -- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts. -- DPAC: A New Data-centric Privacy-preserving Access Control Model. -- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum. -- A2V: Anonymous and Accountable Voting Framework via Blockchain. -- Quantum Safe Computation-friendly Identity-binding Password Authenticated Key Exchange. |
| Record Nr. | UNINA-9910983054403321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part II / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
| Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part II / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVI, 312 p. 47 illus., 22 illus. in color.) |
| Disciplina | 005.824 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer networks - Security measures Application software Cryptology Computer Communication Networks Mobile and Network Security Computer and Information Systems Applications |
| ISBN |
9789819609574
9819609577 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Tight Security. -- Efficient Variants of TNT with BBB Security. -- ROM Reduction Failures: Reasons and Solutions. -- Quantum-Safe Cryptography. -- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials. -- Semi-Compressed CRYSTALS-Kyber. -- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security. -- Distributed System and Blockchain Security. -- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph. -- PDTS: Practical Data Trading Scheme in Distributed Environments. -- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function. -- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping. -- Key Exchange and Privacy. -- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls. -- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming. -- Short Papers. -- SePEnTra: A secure and privacy-preserving energy trading mechanism in the transactive energy market. -- On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages. -- Reusable Fuzzy Extractor from Isogeny. -- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts. -- DPAC: A New Data-centric Privacy-preserving Access Control Model. -- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum. -- A2V: Anonymous and Accountable Voting Framework via Blockchain. -- Quantum Safe Computation-friendly Identity-binding Password Authenticated Key Exchange. |
| Record Nr. | UNISA-996641268603316 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||