default search action
14th ISPEC 2018: Tokyo, Japan
- Chunhua Su, Hiroaki Kikuchi:
Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings. Lecture Notes in Computer Science 11125, Springer 2018, ISBN 978-3-319-99806-0
System Security
- Hiroya Miura, Mamoru Mimura, Hidema Tanaka:
Macros Finder: Do You Remember LOVELETTER? 3-18 - Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser:
Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection. 19-36 - Venkata Udaya Sameer, Ruchira Naskar:
Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification. 37-49 - Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen:
Compact Ring Signature in the Standard Model for Blockchain. 50-65
Public Key Cryptography
- Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi:
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE. 69-86 - Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen:
An Almost Non-interactive Order Preserving Encryption Scheme. 87-100 - Fucai Luo, Kunpeng Wang, Changlu Lin:
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. 101-115
Searchable and Functional Encryption
- Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu:
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits. 119-140 - Pratish Datta:
Constrained (Verifiable) Pseudorandom Function from Functional Encryption. 141-159 - Takato Hirano, Yutaka Kawai, Yoshihiro Koseki:
Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption. 160-175
(Post-quantum) Signature Schemes
- Zhaohui Cheng, Liqun Chen:
Certificateless Public Key Signature Schemes from Standard Algorithms. 179-197 - Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang:
A New Design of Online/Offline Signatures Based on Lattice. 198-212 - Lucas Schabhüser, Denis Butin, Johannes Buchmann:
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case. 213-228 - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation. 229-247 - Bagus Santoso, Taiyo Yamaguchi, Tomoyuki Ohkubo:
Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures. 248-262
Security Protocols
- Sergiu Carpov, Oana Stan:
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes. 265-281 - Binanda Sengupta, Sushmita Ruj:
Keyword-Based Delegable Proofs of Storage. 282-298 - Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan:
A Generic Framework for Accountable Optimistic Fair Exchange Protocol. 299-309
Network Security
- Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, Jin Li:
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. 313-328 - Wei Zong, Yang-Wai Chow, Willy Susilo:
A Two-Stage Classifier Approach for Network Intrusion Detection. 329-340 - Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu:
DSH: Deniable Secret Handshake Framework. 341-353
Authentication
- Shoichi Hirose, Junji Shikata:
Non-adaptive Group-Testing Aggregate MAC Scheme. 357-372 - Weizhi Meng, Zhe Liu:
TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones. 373-390 - Wayne Chiu, Kuo-Hui Yeh, Akihito Nakamura:
Seeing Is Believing: Authenticating Users with What They See and Remember. 391-403
Side-Channel Attacks
- Bo-Yeon Sim, Kyu Young Choi, Dukjae Moon, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han:
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks. 407-423 - Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, Jian Wang:
Recovering Memory Access Sequence with Differential Flush+Reload Attack. 424-439 - Yuntao Wang, Thomas Wunderer:
Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE. 440-452
Security for Cyber-physical Systems
- Yuichi Komano, Zhengfan Xia, Takeshi Kawabata, Hideo Shimizu:
Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices. 455-467 - Alban Gabillon, Emmanuel Bruno:
Regulating IoT Messages. 468-480 - Jing Xu, Yuqiang Zhang, Fei Xu, Lei Zhou, Shuanglin Jiang:
A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks. 481-492
Security in Mobile Environment
- Entao Luo, Guojun Wang, Kun Tang, Quanyou Zhao, Chen He, Liyong Guo:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. 495-505 - Yi-Ning Liu, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu:
Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks. 506-518
Secure Computation and Data Privacy
- Karin Sumongkayothin:
M-ORAM Revisited: Security and Construction Updates. 521-532 - Sabyasachi Dutta, Nishant Nikam, Sushmita Ruj:
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. 533-543 - Jimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty:
(k, l)-Clustering for Transactional Data Streams Anonymization. 544-556
Cryptographic Protocols
- Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. 559-577 - Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. 578-594 - Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:
An Efficient and Provably Secure Private Polynomial Evaluation Scheme. 595-609 - Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang, Yangguang Tian:
Efficient Traceable Oblivious Transfer and Its Applications. 610-621
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.