ICICS C

51 papers

YearTitle / Authors
2018A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs.
Mamoru Mimura, Hidema Tanaka
2018Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication.
Shakirah Hashim, Mohammed Benaissa
2018Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation.
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
2018Application of Public Ledgers to Revocation in Distributed Access Control.
Thanh Bui, Tuomas Aura
2018Attack Trees in Isabelle.
Florian Kammüller
2018Automated Verification of Noninterference Property.
Fan Zhang, Cong Zhang, Mingdi Xu, Xiaoli Liu, Fangning Hu, Han-Chieh Chao
2018Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree.
Kai Chen, Ning Zhang, Liming Wang, Zhen Xu
2018Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets.
Ya Han, Yongqiang Li, Mingsheng Wang
2018Blockchain-Based Secure Data Provenance for Cloud Storage.
Yuan Zhang, Xiaodong Lin, Chunxiang Xu
2018CCA Secure Multi-recipient KEM from LPN.
Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan
2018Certifying Variant of RSA with Generalized Moduli.
Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma
2018Community Discovery of Attribution Trace Based on Deep Learning Approach.
Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng
2018Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes.
Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi
2018Cryptographic Password Obfuscation.
Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan
2018Deep Packet Inspection with Delayed Signature Matching in Network Auditing.
Yingpei Zeng, Shanqing Guo
2018Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System.
Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Tapash Saha
2018Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption.
Yunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen
2018Examine Manipulated Datasets with Topology Data Analysis: A Case Study.
Yun Guo, Daniel Sun, Guoqiang Li, Shiping Chen
2018FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers.
Carlos Andres Lara-Nino, Arturo Díaz-Pérez, Miguel Morales-Sandoval
2018Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage.
Cédric Van Rompay, Refik Molva, Melek Önen
2018Hierarchical Group Signatures with Verifier-Local Revocation.
Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin
2018Identity-Based Functional Encryption for Quadratic Functions from Lattices.
Kelly Yun, Xin Wang, Rui Xue
2018Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications.
Mingjiang Huang, Liming Wang, Yan Zhang
2018Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi
2018Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption.
Rui Zhang, Yang Tao
2018LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains.
Xi Luo, Liming Wang, Zhen Xu, Wei An
2018Linking Differential Identifiability with Differential Privacy.
Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens
2018Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis.
Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man
2018MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li
2018Micropaying to a Distributed Payee with Instant Confirmation.
Peifang Ni, Hongda Li, Dongxue Pan
2018On Security in Encrypted Computing.
Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu
2018On the Weakness of Constant Blinding PRNG in Flash Player.
Chenyu Wang, Tao Huang, Hongjun Wu
2018PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments.
Min Zhu, Kun Zhang, Bibo Tu
2018PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction.
Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian
2018PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing.
Meng Zheng, Jun Zhou, Zhenfu Cao, Xiaolei Dong
2018PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX.
Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng
2018Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen
2018Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons.
Henning Kopp, Frank Kargl, Christoph Bösch
2018Random Number Generators Can Be Fooled to Behave Badly.
George Teseleanu
2018Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment.
Ping Wang, Zijian Zhang, Ding Wang
2018Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu
2018Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters.
Lin Wang, Min Zhu, Qing Li, Bibo Tu
2018Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor.
Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan
2018Slop: Towards an Efficient and Universal Streaming Log Parser.
Zhiyuan Zhao, Chenxu Wang, Wei Rao
2018Study on Advanced Botnet Based on Publicly Available Resources.
Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui
2018Towards Practical Lattice-Based One-Time Linkable Ring Signatures.
Carsten Baum, Huang Lin, Sabine Oechsner
2018USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework.
Xiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens
2018Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation.
Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong
2018Verifiable Single-Server Private Information Retrieval.
Xingfeng Wang, Liang Zhao
2018Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities.
Hiroaki Anada, Seiko Arita
2018uMine: A Blockchain Based on Human Miners.
Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter