| 2018 | Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu |
| 2017 | A Cross-Modal CCA-Based Astroturfing Detection Approach. XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu |
| 2017 | A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys. Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie |
| 2017 | A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han |
| 2017 | A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang |
| 2017 | A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. Jing Yang, Liming Wang, Zhen Xu |
| 2017 | A PUF and Software Collaborative Key Protection Scheme. Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng |
| 2017 | A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng |
| 2017 | A Security-Enhanced vTPM 2.0 for Cloud Computing. Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang |
| 2017 | A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks. Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia |
| 2017 | An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift. Zhi Wang, Meiqi Tian, Chunfu Jia |
| 2017 | An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. Jiahui Shen, Tianyu Chen, Lei Wang, Yuan Ma |
| 2017 | An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi |
| 2017 | Authenticated Group Key Agreement Protocol Without Pairing. Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala |
| 2017 | Compact (Targeted Homomorphic) Inner Product Encryption from LWE. Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang |
| 2017 | Compact Hierarchical IBE from Lattices in the Standard Model. Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang |
| 2017 | Compact Inner Product Encryption from LWE. Zhedong Wang, Xiong Fan, Mingsheng Wang |
| 2017 | Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization. Mingyue Liang, Zhoujun Li, Qiang Zeng, Zhejun Fang |
| 2017 | Distributed Pseudorandom Functions for General Access Structures in NP. Bei Liang, Aikaterini Mitrokotsa |
| 2017 | Efficient Inner Product Encryption with Simulation-Based Security. Qingsong Zhao, Qingkai Zeng, Ximeng Liu |
| 2017 | FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li |
| 2017 | Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng |
| 2017 | Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation. Ying Xia, Yu Huang, Xu Zhang, Hae-Young Bae |
| 2017 | Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. Xinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen |
| 2017 | High-Performance Symmetric Cryptography Server with GPU Acceleration. Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li |
| 2017 | Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. Ming Yuan, Ye Li, Zhoujun Li |
| 2017 | Hypercubes and Private Information Retrieval. Anirban Basu, Rui Xu, Juan Camilo Corena, Shinsaku Kiyomoto |
| 2017 | Identity-Based Group Encryption Revisited. Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe |
| 2017 | Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. Lingchen Li, Wenling Wu, Lei Zhang |
| 2017 | Machine Learning for Black-Box Fuzzing of Network Protocols. Rong Fan, Yaoyao Chang |
| 2017 | Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer |
| 2017 | Modeling Key Infection in Large-Scale Sensor Networks. Feiyang Peng, Zhihong Liu, Yong Zeng, Jialei Wang |
| 2017 | Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. Dali Zhu, Wenjing Rong, Di Wu, Na Pang |
| 2017 | New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. Wenjie Yang, Jian Weng, Futai Zhang |
| 2017 | P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System. Changji Wang, Yuan Yuan, Shengyi Jiang |
| 2017 | Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy. Hai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian, Laifeng Lu |
| 2017 | Pollution Attacks Identification in Structured P2P Overlay Networks. Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem |
| 2017 | Practical Large Universe Attribute-Set Based Encryption in the Standard Model. Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu |
| 2017 | Practical Range Proof for Cryptocurrency Monero with Provable Security. Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu |
| 2017 | Privacy-Preserving Disease Risk Test Based on Bloom Filters. Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu |
| 2017 | Reducing Randomness Complexity of Mask Refreshing Algorithm. Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang |
| 2017 | Research on Clustering-Differential Privacy for Express Data Release. Tianying Chen, Haiyan Kang |
| 2017 | S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol. Feng Xiao, Enhong Chen, Qiang Xu |
| 2017 | SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval |
| 2017 | SDN-Based Secure Localization in Heterogeneous WSN. Meigen Huang, Bin Yu |
| 2017 | SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li |
| 2017 | SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. Yu Li, Yazhe Wang, Yuan Zhang |
| 2017 | Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. Zhiqiang Xu, Debiao He, Xinyi Huang |
| 2017 | Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng |
| 2017 | Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates. Jianing Liu, Kewei Lv |
| 2017 | Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu |
| 2017 | The De-anonymization Method Based on User Spatio-Temporal Mobility Trace. Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li |
| 2017 | The Reductions for the Approximating Covering Radius Problem. Wenwen Wang, Kewei Lv |
| 2017 | Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems. Xueping Liang, Sachin Shetty, Juan Zhao, Daniel Bowden, Danyi Li, Jihong Liu |
| 2017 | Towards Tightly Secure Deterministic Public Key Encryption. Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia |
| 2017 | Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang |
| 2017 | Two Efficient Tag-Based Encryption Schemes on Lattices. Xueqing Wang, Biao Wang, Rui Xue |
| 2017 | Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency. Kazuki Yoneyama, Shogo Kimura |