ICICS C

58 papers

YearTitle / Authors
2018Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu
2017A Cross-Modal CCA-Based Astroturfing Detection Approach.
XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu
2017A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys.
Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie
2017A Method to Effectively Detect Vulnerabilities on Path Planning of VIN.
Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han
2017A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang
2017A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic.
Jing Yang, Liming Wang, Zhen Xu
2017A PUF and Software Collaborative Key Protection Scheme.
Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng
2017A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity.
Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng
2017A Security-Enhanced vTPM 2.0 for Cloud Computing.
Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang
2017A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks.
Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia
2017An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift.
Zhi Wang, Meiqi Tian, Chunfu Jia
2017An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test.
Jiahui Shen, Tianyu Chen, Lei Wang, Yuan Ma
2017An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem.
Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi
2017Authenticated Group Key Agreement Protocol Without Pairing.
Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala
2017Compact (Targeted Homomorphic) Inner Product Encryption from LWE.
Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang
2017Compact Hierarchical IBE from Lattices in the Standard Model.
Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang
2017Compact Inner Product Encryption from LWE.
Zhedong Wang, Xiong Fan, Mingsheng Wang
2017Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization.
Mingyue Liang, Zhoujun Li, Qiang Zeng, Zhejun Fang
2017Distributed Pseudorandom Functions for General Access Structures in NP.
Bei Liang, Aikaterini Mitrokotsa
2017Efficient Inner Product Encryption with Simulation-Based Security.
Qingsong Zhao, Qingkai Zeng, Ximeng Liu
2017FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure.
Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li
2017Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System.
Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng
2017Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation.
Ying Xia, Yu Huang, Xu Zhang, Hae-Young Bae
2017Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Xinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen
2017High-Performance Symmetric Cryptography Server with GPU Acceleration.
Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li
2017Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces.
Ming Yuan, Ye Li, Zhoujun Li
2017Hypercubes and Private Information Retrieval.
Anirban Basu, Rui Xu, Juan Camilo Corena, Shinsaku Kiyomoto
2017Identity-Based Group Encryption Revisited.
Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe
2017Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications.
Lingchen Li, Wenling Wu, Lei Zhang
2017Machine Learning for Black-Box Fuzzing of Network Protocols.
Rong Fan, Yaoyao Chang
2017Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks.
Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer
2017Modeling Key Infection in Large-Scale Sensor Networks.
Feiyang Peng, Zhihong Liu, Yong Zeng, Jialei Wang
2017Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System.
Dali Zhu, Wenjing Rong, Di Wu, Na Pang
2017New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Wenjie Yang, Jian Weng, Futai Zhang
2017P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System.
Changji Wang, Yuan Yuan, Shengyi Jiang
2017Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy.
Hai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian, Laifeng Lu
2017Pollution Attacks Identification in Structured P2P Overlay Networks.
Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem
2017Practical Large Universe Attribute-Set Based Encryption in the Standard Model.
Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu
2017Practical Range Proof for Cryptocurrency Monero with Provable Security.
Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu
2017Privacy-Preserving Disease Risk Test Based on Bloom Filters.
Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu
2017Reducing Randomness Complexity of Mask Refreshing Algorithm.
Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang
2017Research on Clustering-Differential Privacy for Express Data Release.
Tianying Chen, Haiyan Kang
2017S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol.
Feng Xiao, Enhong Chen, Qiang Xu
2017SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems.
Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval
2017SDN-Based Secure Localization in Heterogeneous WSN.
Meigen Huang, Bin Yu
2017SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS.
Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li
2017SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption.
Yu Li, Yazhe Wang, Yuan Zhang
2017Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Zhiqiang Xu, Debiao He, Xinyi Huang
2017Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation.
Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng
2017Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates.
Jianing Liu, Kewei Lv
2017Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm.
Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu
2017The De-anonymization Method Based on User Spatio-Temporal Mobility Trace.
Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li
2017The Reductions for the Approximating Covering Radius Problem.
Wenwen Wang, Kewei Lv
2017Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems.
Xueping Liang, Sachin Shetty, Juan Zhao, Daniel Bowden, Danyi Li, Jihong Liu
2017Towards Tightly Secure Deterministic Public Key Encryption.
Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia
2017Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions.
Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang
2017Two Efficient Tag-Based Encryption Schemes on Lattices.
Xueqing Wang, Biao Wang, Rui Xue
2017Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency.
Kazuki Yoneyama, Shogo Kimura