default search action
19th ISPEC 2024: Wuhan, China
- Zhe Xia, Jiageng Chen:
Information Security Practice and Experience - 19th International Conference, ISPEC 2024, Wuhan, China, October 25-27, 2024, Proceedings. Lecture Notes in Computer Science 15053, Springer 2025, ISBN 978-981-97-9052-4 - Long Teng, Qi Feng, Wei Zhao, Min Luo, Debiao He:
Secure Federated Distillation Framework for Encrypted Traffic Classification. 1-19 - Yujing Liu, Jiangbin Chen, Shuhui Chen:
TriNT: A Framework for ROV Identification Based on Triplet. 20-32 - Yanhua Zhang, Willy Susilo, Yan Chen, Fuchun Guo, Jiaming Wen:
Lattice-Based Universal Designated Multi-verifiers Signature Scheme. 33-54 - Hailong Zhang:
Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling Scenario. 55-74 - Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Shrinkable Ring Signatures: It Wasn't Them! 75-93 - Kangkang Shi, Jiongjiong Ren, Shaozhen Chen:
Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC. 94-111 - Congrong Peng, Cong Peng, Xiaolin Yang, Qingcai Luo, Min Luo:
Isogeny-Based Password-Authenticated Key Exchange Based on Shuffle Algorithm. 112-132 - Zirui Qiao, Ran Xu, Yonghui Lu, Yanwei Zhou, Bo Yang:
A New Construction of Leakage-Resilient Identity-Based Encryption Scheme. 133-150 - Peng Chen, Chi Cheng, Jinnuo Li, Tianqing Zhu:
Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber. 151-167 - Kaiming Chen, Atsuko Miyaji, Jiageng Chen:
Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption. 168-185 - Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang:
Breaking GEA-Like Stream Ciphers with Lower Time Cost. 186-204 - Changlong Yu, Bo Zhang, Boyu Kuang, Anmin Fu:
SNIPER: Detect Complex Attacks Accurately from Traffic. 205-221 - Liwei Liu, Zijian Liu, Na Ruan:
From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework. 222-239 - Zhusen Liu, Jiafei Wu, Zhe Liu:
Efficient Large-Scale Multi-party Computation Based on Garbled Circuit. 240-257 - Mengsi Wu, Pei Li, Jiageng Chen, Shixiong Yao:
Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures. 258-272 - Md Mashrur Arifin, Troy Suyehara Tolman, Jyh-haw Yeh:
Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware Detection. 273-291 - Kanagaratnam Anojjan, Weizhi Meng, Brooke Kidmose, Yu Wang:
An eID-Based Privacy-Enhanced Public Transportation Ticket System. 292-309 - Hong Qin, Debiao He, Qi Feng, Xiaolin Yang, Qingcai Luo:
Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning. 310-328 - Mingwu Zhang, Yulu Zhong, Yifei Wang, Yuntao Wang:
Controlled Multi-client Functional Encryption for Flexible Access Control. 329-346 - Mingwu Zhang, Qi Zou, Bo Yang:
A Secure Incentive Mechanism in Blockchain-Based Mobile Crowdsensing. 347-364 - Rishikesh Sahay, Weizhi Meng, Wenjuan Li:
A Comparative Analysis of Phishing Tools: Features and Countermeasures. 365-382 - Yudi Zhang, Yumei Li, Mingwu Zhang, Willy Susilo:
OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT. 383-402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.