default search action
13th ISPEC 2017: Melbourne, VIC, Australia
- Joseph K. Liu, Pierangela Samarati:
Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Lecture Notes in Computer Science 10701, Springer 2017, ISBN 978-3-319-72358-7
Blockchain
- Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. 3-24 - Xuan Han, Yamin Liu, Haixia Xu:
A User-Friendly Centrally Banked Cryptocurrency. 25-42 - Haibo Tian, Jiejie He, Liqing Fu:
Contract Coin: Toward Practical Contract Signing on Blockchain. 43-61 - Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li:
TTP-free Fair Exchange of Digital Signatures with Bitcoin. 62-81
Asymmetric Encryption
- Jinyong Chang, Honglong Dai, Maozhi Xu:
The KDM-CCA Security of REACT. 85-101 - Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang:
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption. 102-117 - Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang:
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing. 118-135 - Song Luo, Lu Yan, Jian Weng, Zheng Yang:
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting. 136-155 - Bo Lv, Zhiniang Peng, Shaohua Tang:
A Secure Variant of the SRP Encryption Scheme with Shorter Private Key. 156-167 - Bo-Yeon Sim, Dong-Guk Han:
Key Bit-Dependent Attack on Protected PKC Using a Single Trace. 168-185 - Zhongyuan Yao, Yi Mu, Guomin Yang:
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. 186-203 - Pratish Datta:
Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper). 204-214
Symmetric Encryption
- Yu Sasaki, Kan Yasuda:
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. 217-236 - Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao:
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers. 237-255 - Toshiya Shimizu, Takeshi Shimoyama:
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption. 256-275
Lattice-Based Cryptography
- Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact Lossy and All-but-One Trapdoor Functions from Lattice. 279-296 - Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee:
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties. 297-319 - Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda:
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption. 320-330
Searchable Encryption
- Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang, Jie Xiong:
Verifiable Range Query Processing for Cloud Computing. 333-349 - Yanjun Shen, Peng Zhang:
Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries. 350-360 - Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query (Short Paper). 361-372
Signature
- Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang:
Linearly Homomorphic Signatures with Designated Entities. 375-390 - Xinxin Ma, Jun Shao, Cong Zuo, Ru Meng:
Efficient Certificate-Based Signature and Its Aggregation. 391-408 - Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi:
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016. 409-421 - Bei Liang, Aikaterini Mitrokotsa:
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper). 422-431
Authentication
- Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu:
EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System. 435-453 - Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun:
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing. 454-467 - Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, YaLi Zeng:
A Practical Authentication Protocol for Anonymous Web Browsing. 468-482
Cloud Security
- Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard:
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. 485-505 - Yanan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao:
Outsourcing Encrypted Excel Files. 506-524 - Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang:
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. 525-538 - Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard:
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). 539-548
Network Security
- Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. V. Saraswathy, Zhe Liu:
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. 551-565 - Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han:
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). 566-575 - Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah:
Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper). 576-586 - Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang, Wen-Yu Kao:
Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper). 587-598
Cyber-Physical Security
- Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Yanan Li:
Secure Communications in Unmanned Aerial Vehicle Network. 601-620 - Tianxiang Huang, Jianying Zhou, Yi Wang, Anyu Cheng:
On the Security of In-Vehicle Hybrid Network: Status and Challenges. 621-637 - Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng:
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). 638-647 - Orhio Mark Creado, Phu Dung Le:
Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper). 648-659
Social Network and QR Code Security
- Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, Sebastian Schrittwieser:
Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook. 663-677 - Yang-Wai Chow, Willy Susilo, Joonsang Baek:
Covert QR Codes: How to Hide in the Crowd. 678-693 - Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang, Jin Li:
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper). 694-704
Software Security and Trusted Computing
- Sepehr Minagar, Balasubramaniam Srinivasan, Phu Dung Le:
A Formal Model for an Ideal CFI. 707-726 - Jia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem:
Defending Application Cache Integrity of Android Runtime. 727-746 - Zhi Wang, Meiqi Tian, Junnan Wang, Chunfu Jia:
An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper). 747-758 - Lu Ren, Rui Chang, Qing Yin, Wei Wang:
Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper). 759-769 - Yong Tang, Yi Wang, Shuning Wei, Bo Yu, Qiang Yang:
Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper). 770-779
SocialSec Track
- Aaron Hunter:
Reasoning About Trust and Belief Change on a Social Network: A Formal Approach. 783-801 - Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang:
An Effective Authentication for Client Application Using ARM TrustZone. 802-813 - Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch:
Generic Framework for Attribute-Based Group Signature. 814-834 - Xiaoqiang Sun, Peng Zhang, Jianping Yu, Weixin Xie:
An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers. 835-846 - Honglong Dai, Jinyong Chang, Zhenduo Hou, Maozhi Xu:
The ECCA Security of Hybrid Encryptions. 847-859 - Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang-Jaccard, Hans W. Guesgen:
A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices. 860-876 - Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki:
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. 877-891 - Jun Cai, Jian-Zhen Luo, Jianliang Ruan, Yan Liu:
Toward Fuzz Test Based on Protocol Reverse Engineering. 892-897 - Tingmin Wu, Derek Wang, Sheng Wen, Yang Xiang:
How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection. 898-904
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.