


default search action
13th ISPEC 2017: Melbourne, VIC, Australia
- Joseph K. Liu, Pierangela Samarati:

Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Lecture Notes in Computer Science 10701, Springer 2017, ISBN 978-3-319-72358-7
Blockchain
- Ting Chen, Xiaoqi Li

, Ying Wang, Jiachi Chen
, Zihao Li
, Xiapu Luo
, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. 3-24 - Xuan Han, Yamin Liu, Haixia Xu:

A User-Friendly Centrally Banked Cryptocurrency. 25-42 - Haibo Tian, Jiejie He, Liqing Fu:

Contract Coin: Toward Practical Contract Signing on Blockchain. 43-61 - Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li:

TTP-free Fair Exchange of Digital Signatures with Bitcoin. 62-81
Asymmetric Encryption
- Jinyong Chang, Honglong Dai, Maozhi Xu:

The KDM-CCA Security of REACT. 85-101 - Haomiao Yang, Yunfan Huang, Yong Yu

, Mingxuan Yao, Xiaosong Zhang:
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption. 102-117 - Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang

:
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing. 118-135 - Song Luo, Lu Yan, Jian Weng

, Zheng Yang:
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting. 136-155 - Bo Lv, Zhiniang Peng, Shaohua Tang:

A Secure Variant of the SRP Encryption Scheme with Shorter Private Key. 156-167 - Bo-Yeon Sim, Dong-Guk Han:

Key Bit-Dependent Attack on Protected PKC Using a Single Trace. 168-185 - Zhongyuan Yao, Yi Mu, Guomin Yang

:
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. 186-203 - Pratish Datta:

Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper). 204-214
Symmetric Encryption
- Yu Sasaki, Kan Yasuda:

Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. 217-236 - Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao:

Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers. 237-255 - Toshiya Shimizu, Takeshi Shimoyama:

Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption. 256-275
Lattice-Based Cryptography
- Leixiao Cheng, Quanshui Wu, Yunlei Zhao:

Compact Lossy and All-but-One Trapdoor Functions from Lattice. 279-296 - Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee:

A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties. 297-319 - Pradeep Kumar Mishra, Dung Hoang Duong

, Masaya Yasuda:
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption. 320-330
Searchable Encryption
- Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang, Jie Xiong:

Verifiable Range Query Processing for Cloud Computing. 333-349 - Yanjun Shen, Peng Zhang:

Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries. 350-360 - Jia Xu

, Ee-Chien Chang
, Jianying Zhou
:
A New Functional Encryption for Multidimensional Range Query (Short Paper). 361-372
Signature
- Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang:

Linearly Homomorphic Signatures with Designated Entities. 375-390 - Xinxin Ma, Jun Shao, Cong Zuo, Ru Meng:

Efficient Certificate-Based Signature and Its Aggregation. 391-408 - Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi:

Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016. 409-421 - Bei Liang

, Aikaterini Mitrokotsa
:
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper). 422-431
Authentication
- Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu:

EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System. 435-453 - Jian Shen

, Meng Feng, Dengzhi Liu, Chen Wang
, Jiachen Jiang, Xingming Sun:
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing. 454-467 - Xu Yang, Xun Yi, Hui Cui

, Xuechao Yang
, Surya Nepal
, Xinyi Huang, YaLi Zeng:
A Practical Authentication Protocol for Anonymous Web Browsing. 468-482
Cloud Security
- Clémentine Gritti, Rongmao Chen, Willy Susilo

, Thomas Plantard
:
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. 485-505 - Yanan Li

, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang
, Meixia Miao:
Outsourcing Encrypted Excel Files. 506-524 - Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang

:
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. 525-538 - Hooman Alavizadeh

, Dong Seong Kim
, Jin B. Hong
, Julian Jang-Jaccard
:
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). 539-548
Network Security
- Xinwei Gao

, Lin Li, Jintai Ding
, Jiqiang Liu, R. V. Saraswathy, Zhe Liu:
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. 551-565 - Yidan Zhang, Marino Anthony James, Jiageng Chen

, Chunhua Su, Jinguang Han
:
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). 566-575 - Thomas D. Wagner, Esther Palomar

, Khaled Mahbub, Ali E. Abdallah:
Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper). 576-586 - Mei-Ling Chiang

, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang, Wen-Yu Kao:
Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper). 587-598
Cyber-Physical Security
- Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Yanan Li:

Secure Communications in Unmanned Aerial Vehicle Network. 601-620 - Tianxiang Huang, Jianying Zhou

, Yi Wang
, Anyu Cheng:
On the Security of In-Vehicle Hybrid Network: Status and Challenges. 621-637 - Zhuo Wei, Yanjiang Yang, Rehana Yasmin

, Yongdong Wu, Jian Weng
, Robert H. Deng
:
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). 638-647 - Orhio Mark Creado, Phu Dung Le:

Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper). 648-659
Social Network and QR Code Security
- Jinwoo Kim, Kuyju Kim, Junsung Cho

, Hyoungshick Kim, Sebastian Schrittwieser
:
Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook. 663-677 - Yang-Wai Chow

, Willy Susilo
, Joonsang Baek
:
Covert QR Codes: How to Hide in the Crowd. 678-693 - Bo Liu

, Wanlei Zhou
, Shui Yu
, Kun Wang, Yu Wang, Yong Xiang, Jin Li:
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper). 694-704
Software Security and Trusted Computing
- Sepehr Minagar, Balasubramaniam Srinivasan, Phu Dung Le:

A Formal Model for an Ideal CFI. 707-726 - Jia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem:

Defending Application Cache Integrity of Android Runtime. 727-746 - Zhi Wang, Meiqi Tian, Junnan Wang, Chunfu Jia:

An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper). 747-758 - Lu Ren, Rui Chang, Qing Yin, Wei Wang:

Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper). 759-769 - Yong Tang, Yi Wang, Shuning Wei, Bo Yu, Qiang Yang:

Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper). 770-779
SocialSec Track
- Aaron Hunter:

Reasoning About Trust and Belief Change on a Social Network: A Formal Approach. 783-801 - Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang:

An Effective Authentication for Client Application Using ARM TrustZone. 802-813 - Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu

, Olivier Markowitch:
Generic Framework for Attribute-Based Group Signature. 814-834 - Xiaoqiang Sun, Peng Zhang, Jianping Yu, Weixin Xie:

An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers. 835-846 - Honglong Dai, Jinyong Chang, Zhenduo Hou, Maozhi Xu:

The ECCA Security of Hybrid Encryptions. 847-859 - Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim

, Julian Jang-Jaccard, Hans W. Guesgen:
A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices. 860-876 - Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki

:
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. 877-891 - Jun Cai, Jian-Zhen Luo, Jianliang Ruan, Yan Liu:

Toward Fuzz Test Based on Protocol Reverse Engineering. 892-897 - Tingmin Wu, Derek Wang

, Sheng Wen
, Yang Xiang
:
How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection. 898-904

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














