


default search action
18th ProvSec 2024: Gold Coast, QLD, Australia - Part II
- Joseph K. Liu, Liqun Chen

, Shi-Feng Sun, Xiaoning Liu:
Provable and Practical Security - 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14904, Springer 2025, ISBN 978-981-96-0956-7
Tight Security
- Ritam Bhaumik

, Wonseok Choi
, Avijit Dutta
, Cuauhtemoc Mancillas López
, Hrithik Nandi
, Yaobin Shen:
Efficient Variants of TNT with BBB Security. 3-22 - Ziyi Li, Xianhui Lu, Yao Cheng:

ROM Reduction Failures: Reasons and Solutions. 23-42
Quantum-Safe Cryptography
- Zoey Ziyi Li

, Xinyu Zhang
, Hui Cui
, Jun Zhao
, Xuan Chen
:
BDEC: Enhancing Learning Credibility via Post-quantum Digital Credentials. 45-64 - Shuiyin Liu

, Amin Sakzad
:
Semi-compressed CRYSTALS-Kyber. 65-82 - Zuoxia Yu

, Rupeng Yang
, Willy Susilo
, Man Ho Au
:
Blocklistable Anonymous Credential for Circuits with Post-quantum Security. 83-105
Distributed System and Blockchain Security
- Haibo Tian, Jiajun Chen:

Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph. 109-123 - Kun Wang, Qianhong Wu, Tianxu Han, Sipeng Xie, Qin Wang, Yingmiao Zhang, Bo Qin, Xiaopeng Dai:

PDTS: Practical Data Trading Scheme in Distributed Environments. 124-142 - Peng Yang, Zoe Lin Jiang, Shiqi Gao, Hongxiao Wang, Jun Zhou, Yangyiye Jin, Siu-Ming Yiu, Junbin Fang

:
Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function. 143-163 - Zixu Zhang

, Hongbo Yin
, Ying Wang
, Guangsheng Yu
, Xu Wang
, Wei Ni
, Ren Ping Liu
:
Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping. 164-178
Key Exchange and Privacy
- Jiahao Liu, Rongmao Chen, Yi Wang, Xincheng Tang, Jinshu Su:

Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls. 181-200 - Hong-Yen Tran, Jiankun Hu, Shabnam Kasra Kermanshahi:

On Sealed-Bid Combinatorial Auction with Privacy-Preserving Dynamic Programming. 201-220
Short Papers
- Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley:

SePEnTra: A Secure and Privacy-Preserving Energy Trading Mechanism in the Transactive Energy Market. 223-235 - Masayuki Fukumitsu

, Shingo Hasegawa
:
On Multi-User Security of Lattice-Based Signature Under Adaptive Corruptions and Key Leakages. 236-245 - Yu Zhou

, Shengli Liu
, Shuai Han
:
Reusable Fuzzy Extractor from Isogeny. 246-256 - Peng Zhang, Jiaquan Wei, Yuhong Liu, Jianzhou Ruan, Hui Cui:

Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts. 257-266 - Xu Wang

, Baihe Ma
, Ren Ping Liu
, Ian J. Oppermann
:
DPAC: A New Data-Centric Privacy-Preserving Access Control Model. 267-276 - Phuong Duy Huynh

, Son Hoang Dau
, Xiaodong Li
, Phuc Luong
, Emanuele Viterbo
:
Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum. 277-287 - Zhimei Sui, Liangrong Zhao:

A2V: Anonymous and Accountable Voting Framework via Blockchain. 288-297 - Pratima Jana, Ratna Dutta, Cong Zuo:

Quantum Safe Computation-Friendly Identity-Binding Password Authenticated Key Exchange. 298-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














