| 2018 | A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs. Mamoru Mimura, Hidema Tanaka |
| 2018 | Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication. Shakirah Hashim, Mohammed Benaissa |
| 2018 | Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba |
| 2018 | Application of Public Ledgers to Revocation in Distributed Access Control. Thanh Bui, Tuomas Aura |
| 2018 | Attack Trees in Isabelle. Florian Kammüller |
| 2018 | Automated Verification of Noninterference Property. Fan Zhang, Cong Zhang, Mingdi Xu, Xiaoli Liu, Fangning Hu, Han-Chieh Chao |
| 2018 | Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree. Kai Chen, Ning Zhang, Liming Wang, Zhen Xu |
| 2018 | Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. Ya Han, Yongqiang Li, Mingsheng Wang |
| 2018 | Blockchain-Based Secure Data Provenance for Cloud Storage. Yuan Zhang, Xiaodong Lin, Chunxiang Xu |
| 2018 | CCA Secure Multi-recipient KEM from LPN. Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan |
| 2018 | Certifying Variant of RSA with Generalized Moduli. Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma |
| 2018 | Community Discovery of Attribution Trace Based on Deep Learning Approach. Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng |
| 2018 | Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi |
| 2018 | Cryptographic Password Obfuscation. Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan |
| 2018 | Deep Packet Inspection with Delayed Signature Matching in Network Auditing. Yingpei Zeng, Shanqing Guo |
| 2018 | Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System. Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Tapash Saha |
| 2018 | Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. Yunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen |
| 2018 | Examine Manipulated Datasets with Topology Data Analysis: A Case Study. Yun Guo, Daniel Sun, Guoqiang Li, Shiping Chen |
| 2018 | FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers. Carlos Andres Lara-Nino, Arturo Díaz-Pérez, Miguel Morales-Sandoval |
| 2018 | Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage. Cédric Van Rompay, Refik Molva, Melek Önen |
| 2018 | Hierarchical Group Signatures with Verifier-Local Revocation. Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin |
| 2018 | Identity-Based Functional Encryption for Quadratic Functions from Lattices. Kelly Yun, Xin Wang, Rui Xue |
| 2018 | Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications. Mingjiang Huang, Liming Wang, Yan Zhang |
| 2018 | Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi |
| 2018 | Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. Rui Zhang, Yang Tao |
| 2018 | LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains. Xi Luo, Liming Wang, Zhen Xu, Wei An |
| 2018 | Linking Differential Identifiability with Differential Privacy. Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2018 | Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man |
| 2018 | MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li |
| 2018 | Micropaying to a Distributed Payee with Instant Confirmation. Peifang Ni, Hongda Li, Dongxue Pan |
| 2018 | On Security in Encrypted Computing. Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu |
| 2018 | On the Weakness of Constant Blinding PRNG in Flash Player. Chenyu Wang, Tao Huang, Hongjun Wu |
| 2018 | PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. Min Zhu, Kun Zhang, Bibo Tu |
| 2018 | PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction. Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian |
| 2018 | PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. Meng Zheng, Jun Zhou, Zhenfu Cao, Xiaolei Dong |
| 2018 | PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng |
| 2018 | Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage. Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen |
| 2018 | Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons. Henning Kopp, Frank Kargl, Christoph Bösch |
| 2018 | Random Number Generators Can Be Fooled to Behave Badly. George Teseleanu |
| 2018 | Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment. Ping Wang, Zijian Zhang, Ding Wang |
| 2018 | Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu |
| 2018 | Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters. Lin Wang, Min Zhu, Qing Li, Bibo Tu |
| 2018 | Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan |
| 2018 | Slop: Towards an Efficient and Universal Streaming Log Parser. Zhiyuan Zhao, Chenxu Wang, Wei Rao |
| 2018 | Study on Advanced Botnet Based on Publicly Available Resources. Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui |
| 2018 | Towards Practical Lattice-Based One-Time Linkable Ring Signatures. Carsten Baum, Huang Lin, Sabine Oechsner |
| 2018 | USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. Xiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2018 | Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong |
| 2018 | Verifiable Single-Server Private Information Retrieval. Xingfeng Wang, Liang Zhao |
| 2018 | Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities. Hiroaki Anada, Seiko Arita |
| 2018 | uMine: A Blockchain Based on Human Miners. Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter |