| 2017 | A Formal Model for an Ideal CFI. Sepehr Minagar, Balasubramaniam Srinivasan, Phu Dung Le |
| 2017 | A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties. Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee |
| 2017 | A New Functional Encryption for Multidimensional Range Query (Short Paper). Jia Xu, Ee-Chien Chang, Jianying Zhou |
| 2017 | A Practical Authentication Protocol for Anonymous Web Browsing. Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng |
| 2017 | A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices. Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang-Jaccard, Hans W. Guesgen |
| 2017 | A Secure Variant of the SRP Encryption Scheme with Shorter Private Key. Bo Lv, Zhiniang Peng, Shaohua Tang |
| 2017 | A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki |
| 2017 | A User-Friendly Centrally Banked Cryptocurrency. Xuan Han, Yamin Liu, Haixia Xu |
| 2017 | An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang |
| 2017 | An Effective Authentication for Client Application Using ARM TrustZone. Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang |
| 2017 | An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper). Zhi Wang, Meiqi Tian, Junnan Wang, Chunfu Jia |
| 2017 | An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers. Xiaoqiang Sun, Peng Zhang, Jianping Yu, Weixin Xie |
| 2017 | Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han |
| 2017 | Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption. Toshiya Shimizu, Takeshi Shimoyama |
| 2017 | Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper). Pratish Datta |
| 2017 | Compact Lossy and All-but-One Trapdoor Functions from Lattice. Leixiao Cheng, Quanshui Wu, Yunlei Zhao |
| 2017 | Contract Coin: Toward Practical Contract Signing on Blockchain. Haibo Tian, Jiejie He, Liqing Fu |
| 2017 | Covert QR Codes: How to Hide in the Crowd. Yang-Wai Chow, Willy Susilo, Joonsang Baek |
| 2017 | Defending Application Cache Integrity of Android Runtime. Jia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem |
| 2017 | Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper). Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang, Wen-Yu Kao |
| 2017 | Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers. Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao |
| 2017 | Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard |
| 2017 | Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard |
| 2017 | Efficient Certificate-Based Signature and Its Aggregation. Xinxin Ma, Jun Shao, Cong Zuo, Ru Meng |
| 2017 | Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper). Orhio Mark Creado, Phu Dung Le |
| 2017 | Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing. Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun |
| 2017 | Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption. Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda |
| 2017 | EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System. Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu |
| 2017 | Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. V. Saraswathy, Zhe Liu |
| 2017 | Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper). Bei Liang, Aikaterini Mitrokotsa |
| 2017 | Generic Framework for Attribute-Based Group Signature. Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch |
| 2017 | Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. Zhongyuan Yao, Yi Mu, Guomin Yang |
| 2017 | Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook. Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, Sebastian Schrittwieser |
| 2017 | Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing. Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang |
| 2017 | Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper). Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang, Jin Li |
| 2017 | How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection. Tingmin Wu, Derek Wang, Sheng Wen, Yang Xiang |
| 2017 | Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings Joseph K. Liu, Pierangela Samarati |
| 2017 | IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng |
| 2017 | Key Bit-Dependent Attack on Protected PKC Using a Single Trace. Bo-Yeon Sim, Dong-Guk Han |
| 2017 | Linearly Homomorphic Signatures with Designated Entities. Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang |
| 2017 | Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper). Yong Tang, Yi Wang, Shuning Wei, Bo Yu, Qiang Yang |
| 2017 | New Proof for BKP IBE Scheme and Improvement in the MIMC Setting. Song Luo, Lu Yan, Jian Weng, Zheng Yang |
| 2017 | On the Security of In-Vehicle Hybrid Network: Status and Challenges. Tianxiang Huang, Jianying Zhou, Yi Wang, Anyu Cheng |
| 2017 | Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. Yu Sasaki, Kan Yasuda |
| 2017 | Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Junbin Fang |
| 2017 | Outsourcing Encrypted Excel Files. Yanan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao |
| 2017 | Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption. Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang |
| 2017 | Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries. Yanjun Shen, Peng Zhang |
| 2017 | Reasoning About Trust and Belief Change on a Social Network: A Formal Approach. Aaron Hunter |
| 2017 | Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016. Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi |
| 2017 | Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper). Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah |
| 2017 | Secure Communications in Unmanned Aerial Vehicle Network. Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Yanan Li |
| 2017 | TTP-free Fair Exchange of Digital Signatures with Bitcoin. Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li |
| 2017 | The ECCA Security of Hybrid Encryptions. Honglong Dai, Jinyong Chang, Zhenduo Hou, Maozhi Xu |
| 2017 | The KDM-CCA Security of REACT. Jinyong Chang, Honglong Dai, Maozhi Xu |
| 2017 | Toward Fuzz Test Based on Protocol Reverse Engineering. Jun Cai, Jian-Zhen Luo, Jianliang Ruan, Yan Liu |
| 2017 | Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper). Lu Ren, Rui Chang, Qing Yin, Wei Wang |
| 2017 | Verifiable Range Query Processing for Cloud Computing. Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang, Jie Xiong |