


default search action
23rd ISC 2020: Bali, Indonesia
- Willy Susilo
, Robert H. Deng
, Fuchun Guo
, Yannan Li
, Rolly Intan:
Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings. Lecture Notes in Computer Science 12472, Springer 2020, ISBN 978-3-030-62973-1
Public-Key Cryptography
- Xiaopeng Zhao, Zhenfu Cao
, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE from Quadratic Residuosity with Fast Encryption. 3-19 - Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. 20-38 - Rouzbeh Behnia, Attila Altay Yavuz
, Muslum Ozgur Ozmen, Tsz Hon Yuen
:
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. 39-58 - Soma Murata
, Daiki Miyahara
, Takaaki Mizuki
, Hideaki Sone
:
Public-PEZ Cryptography. 59-74 - Xin Chen, Liang Feng Zhang:
Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials. 75-91
Symmetric-Key Cryptography and Lattice
- Youle Xu, Qichun Wang:
Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance. 95-106 - Hiroki Okada
, Shinsaku Kiyomoto, Carlos Cid:
Integerwise Functional Bootstrapping on TFHE. 107-125
Attacks and Cryptanalysis
- Ryoma Ito
:
Rotational Cryptanalysis of Salsa Core Function. 129-145 - Ge Cheng
, Hui Xie
, Dongliang Zhang
:
Analyzing the Chain of Trust Model Based on Entity Dependence. 146-159 - Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, Jingzi Meng:
Evaluation on the Security of Commercial Cloud Container Services. 160-177 - Haoyu Ma
, Jianwen Tian, Debin Gao
, Chunfu Jia:
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel. 178-195
Malware Analysis
- Jamie Pont
, Budi Arief
, Julio C. Hernandez-Castro
:
Why Current Statistical Approaches to Ransomware Detection Fail. 199-216 - Kai Chih Chang
, Razieh Nokhbeh Zaeem
, K. Suzanne Barber
:
A Framework for Estimating Privacy Risk Scores of Mobile Apps. 217-233 - Jorge Sanz Maroto, Haoyu Liu
, Paul Patras:
On the Struggle Bus: A Detailed Security Analysis of the m-tickets App. 234-252
Network and System Security
- Zuchao Ma, Liang Liu, Weizhi Meng
:
ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks. 255-273 - Saihua Cai
, Jinfu Chen, Xinru Li, Bo Liu:
Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints. 274-289 - Don Kuzhiyelil, Philipp Zieris
, Marine Kadar, Sergey Tverdyshev
, Gerhard Fohler
:
Towards Transparent Control-Flow Integrity in Safety-Critical Systems. 290-311
Blokchain
- Abba Garba
, Arne Bochem
, Benjamin Leiding
:
BlockVoke - Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust. 315-333 - Junming Ke, Pawel Szalachowski, Jianying Zhou
, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. 334-351 - Xiaoqi Li
, Ting Chen, Xiapu Luo, Jiangshan Yu
:
Characterizing Erasable Accounts in Ethereum. 352-371 - Rujia Li, Qin Wang
, Feng Liu
, Qi Wang
, David Galindo:
An Accountable Decryption System Based on Privacy-Preserving Smart Contracts. 372-390
Security Applications
- Mauro Conti
, Pier Paolo Tricomi
:
PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition. 393-408 - Alberto Blanco-Justicia
, Josep Domingo-Ferrer
:
Privacy-Preserving Computation of the Earth Mover's Distance. 409-423

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.