default search action
2nd DSPP 2024: Xi'an, China - Part I
- Xiaofeng Chen, Xinyi Huang, Moti Yung:
Data Security and Privacy Protection - Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15215, Springer 2025, ISBN 978-981-97-8539-1
Blockchain and Related Technologies
- Zi Jiao, Fucai Zhou, Qiang Wang, Jintong Sun:
Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration. 3-20 - Jiayi An, Haibo Tian:
Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine. 21-38 - Bo Li, Yuling Chen, Siyuan Huang, Yuxiang Yang:
Cross-Chain Asset Trading Scheme Without Trusted Third-Party. 39-51 - Shichuan Guo:
Secure Monero on Corrupted Machines with Reverse Firewalls. 52-68 - Phan H. T. Trung, Loc Van Cao Phu, Khoa Tran Dang, Kha Nguyen Hoang, Bao Tran Quoc, Hieu Doan Minh, Trong Nguyen Duong Phu, Ngan Nguyen Thi Kim:
Blockchain Solutions for Pediatric Vaccination Security: Encrypted NFTs. 69-84
Cryptographic Primitives, Protocols and Cryptanalysis
- Yuan Tian, Yongda Pang:
Efficient Zero-Knowledge Argument for Bilinear Matrix Relation over the Residue Ring. 87-105 - Yi Chuai, Leyou Zhang, Shuwei Xie, Runze Tian, Zhuang Shan:
Hierarchical Identity-Based Encryption Based on SM9. 106-118 - Xin Liu, Willy Susilo, Joonsang Baek:
Extended Withdrawable Signature. 119-140 - Jingwei Song, Xuru Li, Lifei Wei, Xinyu Meng, Le Yu:
SSINsAuth: Fast Batch Handover Authentication Protocol in Space-Sea Integrated Networks. 141-159 - Jiahao Liu, Jinshu Su, Yi Wang, Xincheng Tang:
Secure Key Exchange via Transparent Reverse Firewalls. 160-177 - Jingjie Gan, Meijuan Huang, Yanqi Zhao, Sirui Ji:
An Efficient Public Key Searchable Encryption Scheme for the Healthcare Cloud. 178-194 - Yingli Duan, Weizhi Meng, Wei-Yang Chiu:
UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions. 195-210 - Chunhui Wu, Siwei Jiang, Fangguo Zhang, Yusong Du, Qiping Lin:
An Efficient Threshold Ring Signature from G+G Identification Protocol. 211-221
AI Security
- Hao Song, Jiacheng Yao, Xuanze Chen, Shaocong Xu, Shibo Jin, Jiajun Zhou, Chenbo Fu, Qi Xuan, Shanqing Yu:
A Federated Parameter Aggregation Method for Node Classification Tasks with Different Graph Network Structures. 225-243 - Yancheng Sun, Yuling Chen, Ziyang Liu, Hui Dou, Chaoyue Tan:
Targeted Universal Adversarial Attack Based on Fourier Transform. 244-259 - Kazi Fatema, Mehrin Anannya, Samrat Kumar Dey, Chunhua Su, Rashed Mazumder:
Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection. 260-275 - Xiaowei Zhang, Shigang Liu, Jun Zhang, Yang Xiang:
PTFix: Rule-Based and LLM Techniques for Java Path Traversal Vulnerability. 276-293 - Jiluan Fan, Pei-Gen Ye, Anli Yan:
In-Context Learning with Differentially Private Text Sanitization in Large Language Models. 294-303 - Meng Zhang, Xiangyang Luo, Ningbo Huang:
Social Media User Geolocation Based on Large Language Models. 304-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.