top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Privacy Enhancing Techniques : Practices and Applications / / by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino
Privacy Enhancing Techniques : Practices and Applications / / by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino
Autore Yi Xun
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (367 pages)
Disciplina 005.8
323.448
Altri autori (Persone) YangXuechao
LiuXiaoning
KelarevAndrei
LamKwok-Yan
YangMengmeng
WangXiangning
BertinoElisa
Soggetto topico Data protection - Law and legislation
Data mining
Machine learning
Privacy
Data Mining and Knowledge Discovery
Machine Learning
ISBN 3-031-95140-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction -- Chapter 2: Homomorphic Encryption -- Chapter 3: Multiparty Computation -- Chapter 4: Differential Privacy -- Chapter 5: Privacy-Preserving Data Mining -- Chapter 6: Privacy-Preserving Machine Learning -- Chapter 7: Privacy-Preserving Social Networks -- Chapter 8: Privacy-Preserving Location-Based Services -- Chapter 9: Privacy and Digital Trust -- Chapter 10: Conclusion.
Record Nr. UNINA-9911015687303321
Yi Xun  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
Autore Liu Joseph K
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (592 pages)
Disciplina 005.824
Altri autori (Persone) ChenLiqun
SunShi-Feng
LiuXiaoning
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer networks - Security measures
Application software
Cryptology
Computer Communication Networks
Mobile and Network Security
Computer and Information Systems Applications
ISBN 9789819609543
9819609542
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Multi-Party Computation. -- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation. -- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings. -- Secure Five-party Computation with Private Robustness and Minimal Online Communication. -- Model Extraction Attack on MPC Hardened Vertical Federated Learning. -- Searchable Encryption. -- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding. -- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage. -- Encryption. -- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption. -- Ideal Public Key Encryption, Revisited. -- Simple Construction of PEKS from LWE-based IBE in the Standard Model. -- Signature. -- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions. -- Tightly Secure Identity-based Signature from Cryptographic Group Actions. -- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature. -- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing. -- Threshold Ring Signatures: From DualRing to the t+1 Rings. -- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model.
Record Nr. UNINA-9910983330103321
Liu Joseph K  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
Autore Liu Joseph K
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (592 pages)
Disciplina 005.824
Altri autori (Persone) ChenLiqun
SunShi-Feng
LiuXiaoning
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer networks - Security measures
Application software
Cryptology
Computer Communication Networks
Mobile and Network Security
Computer and Information Systems Applications
ISBN 9789819609543
9819609542
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Multi-Party Computation. -- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation. -- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings. -- Secure Five-party Computation with Private Robustness and Minimal Online Communication. -- Model Extraction Attack on MPC Hardened Vertical Federated Learning. -- Searchable Encryption. -- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding. -- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage. -- Encryption. -- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption. -- Ideal Public Key Encryption, Revisited. -- Simple Construction of PEKS from LWE-based IBE in the Standard Model. -- Signature. -- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions. -- Tightly Secure Identity-based Signature from Cryptographic Group Actions. -- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature. -- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing. -- Threshold Ring Signatures: From DualRing to the t+1 Rings. -- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model.
Record Nr. UNISA-996647867803316
Liu Joseph K  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part II / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part II / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 312 p. 47 illus., 22 illus. in color.)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer networks - Security measures
Application software
Cryptology
Computer Communication Networks
Mobile and Network Security
Computer and Information Systems Applications
ISBN 9789819609574
9819609577
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Tight Security. -- Efficient Variants of TNT with BBB Security. -- ROM Reduction Failures: Reasons and Solutions. -- Quantum-Safe Cryptography. -- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials. -- Semi-Compressed CRYSTALS-Kyber. -- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security. -- Distributed System and Blockchain Security. -- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph. -- PDTS: Practical Data Trading Scheme in Distributed Environments. -- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function. -- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping. -- Key Exchange and Privacy. -- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls. -- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming. -- Short Papers. -- SePEnTra: A secure and privacy-preserving energy trading mechanism in the transactive energy market. -- On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages. -- Reusable Fuzzy Extractor from Isogeny. -- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts. -- DPAC: A New Data-centric Privacy-preserving Access Control Model. -- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum. -- A2V: Anonymous and Accountable Voting Framework via Blockchain. -- Quantum Safe Computation-friendly Identity-binding Password Authenticated Key Exchange.
Record Nr. UNINA-9910983054403321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part II / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part II / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 312 p. 47 illus., 22 illus. in color.)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer networks - Security measures
Application software
Cryptology
Computer Communication Networks
Mobile and Network Security
Computer and Information Systems Applications
ISBN 9789819609574
9819609577
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Tight Security. -- Efficient Variants of TNT with BBB Security. -- ROM Reduction Failures: Reasons and Solutions. -- Quantum-Safe Cryptography. -- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials. -- Semi-Compressed CRYSTALS-Kyber. -- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security. -- Distributed System and Blockchain Security. -- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph. -- PDTS: Practical Data Trading Scheme in Distributed Environments. -- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function. -- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping. -- Key Exchange and Privacy. -- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls. -- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming. -- Short Papers. -- SePEnTra: A secure and privacy-preserving energy trading mechanism in the transactive energy market. -- On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages. -- Reusable Fuzzy Extractor from Isogeny. -- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts. -- DPAC: A New Data-centric Privacy-preserving Access Control Model. -- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum. -- A2V: Anonymous and Accountable Voting Framework via Blockchain. -- Quantum Safe Computation-friendly Identity-binding Password Authenticated Key Exchange.
Record Nr. UNISA-996641268603316
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui