default search action
CSS 2022: Xi'an, China
- Xiaofeng Chen, Jian Shen, Willy Susilo:
Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings. Lecture Notes in Computer Science 13547, Springer 2022, ISBN 978-3-031-18066-8
Cryptography and Its Applications
- Qitian Sheng, Jiaojiao Wu, Jianfeng Wang:
Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead. 3-16 - Yuqian Ma, Yongliu Ma, Yidan Liu, Qingfeng Cheng:
A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare. 17-31 - Yong Wang, Hao Xie, Ruyi Wang:
Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q). 32-47 - Yifei Li, Yinghui Zhang, Wei Liu, Jianting Ning, Dong Zheng:
A Collaborative Access Control Scheme Based on Incentive Mechanisms. 48-55 - Zijian Bao, Debiao He, Yulin Liu, Cong Peng, Qi Feng, Min Luo:
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing. 56-70 - Zhenhua Liu, Yuanju Ma, Yaxin Niu, Jingwan Gong, Baocang Wang:
Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage. 71-85
Data Security
- Yao Liu, Zhonghao Yuan, Yunhan Hu:
FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers. 89-108 - Shujiang Xu, Fansheng Wang, Lianhai Wang, Xu Chang, Tongfeng Yang, Weijun Yang:
A Method of Traceless File Deletion for NTFS File System. 109-117 - Lifei Wei, Jihai Liu, Lei Zhang, Wuji Zhang:
Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting. 118-132 - Meixia Miao, Panru Wu, Yunling Wang:
Multi-user Verifiable Database with Efficient Keyword Search. 133-146 - Jie Xiao, Hui Huang, Chenhuang Wu, Qunshan Chen, Zhenjie Huang:
A Blockchain-Based Collaborative Auditing Scheme for Cloud Storage. 147-159
Attack and Defense Techniques
- Wei Zong, Yang-Wai Chow, Willy Susilo:
High Quality Audio Adversarial Examples Without Using Psychoacoustics. 163-177 - Zian Liu, Chao Chen, Leo Yu Zhang, Shang Gao:
Working Mechanism of Eternalblue and Its Application in Ransomworm. 178-191 - Yuliang Lin, Rongmao Chen, Yi Wang, Baosheng Wang, Lin Liu:
Substitution Attacks Against Sigma Protocols. 192-208 - Lixia Xie, Xueou Li, Hongyu Yang, Liang Zhang:
A Multi-stage APT Attack Detection Method Based on Sample Enhancement. 209-216 - Hongyu Yang, Haiyun Yang, Liang Zhang:
VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer. 217-224 - Yaping Chi, Defan Xue, Ziyan Yue, Zhiqiang Wang, Liang Jiaming:
Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning. 225-243 - Mengfan Xu, Xinghua Li:
FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme. 244-258 - Zhengyang Liu, Xiaoyu Zhang, Chenyang Chen, Shen Lin, Jingjin Li:
Membership Inference Attacks Against Robust Graph Neural Network. 259-273
Network Security and Its Applications
- Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li:
A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice. 277-292 - Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang:
A Defect Level Assessment Method Based on Weighted Probability Ensemble. 293-300 - Yifan Zhang, Yuping Zhou, Yu Hu, Hui Huang:
A Decentralized Ride-Hailing Mode Based on Blockchain and Attribute Encryption. 301-313 - Ruozhou Zuo, Haibo Tian, Zhiyuan An, Fangguo Zhang:
Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on Lattice. 314-326 - Meeraj Mahendra Gawde, Gaurav Choudhary, Shishir Kumar Shandilya, Rizwan Ur Rahman, Hoonyong Park, Ilsun You:
Improvised Model for Blockchain in Distributed Cloud Environment. 327-341 - Hui Li, Xuelian Li, Juntao Gao, Runsong Wang:
Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model. 342-357 - Yuanzhen Liu, Yanbo Yang, Jiawei Zhang, Baoshan Li:
Design of Anti Machine Learning Malicious Node System Based on Blockchain. 358-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.