ISPEC C

58 papers

YearTitle / Authors
2017A Formal Model for an Ideal CFI.
Sepehr Minagar, Balasubramaniam Srinivasan, Phu Dung Le
2017A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties.
Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee
2017A New Functional Encryption for Multidimensional Range Query (Short Paper).
Jia Xu, Ee-Chien Chang, Jianying Zhou
2017A Practical Authentication Protocol for Anonymous Web Browsing.
Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng
2017A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices.
Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang-Jaccard, Hans W. Guesgen
2017A Secure Variant of the SRP Encryption Scheme with Shorter Private Key.
Bo Lv, Zhiniang Peng, Shaohua Tang
2017A Secure and Practical Signature Scheme for Blockchain Based on Biometrics.
Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki
2017A User-Friendly Centrally Banked Cryptocurrency.
Xuan Han, Yamin Liu, Haixia Xu
2017An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang
2017An Effective Authentication for Client Application Using ARM TrustZone.
Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang
2017An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper).
Zhi Wang, Meiqi Tian, Junnan Wang, Chunfu Jia
2017An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers.
Xiaoqiang Sun, Peng Zhang, Jianping Yu, Weixin Xie
2017Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han
2017Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption.
Toshiya Shimizu, Takeshi Shimoyama
2017Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper).
Pratish Datta
2017Compact Lossy and All-but-One Trapdoor Functions from Lattice.
Leixiao Cheng, Quanshui Wu, Yunlei Zhao
2017Contract Coin: Toward Practical Contract Signing on Blockchain.
Haibo Tian, Jiejie He, Liqing Fu
2017Covert QR Codes: How to Hide in the Crowd.
Yang-Wai Chow, Willy Susilo, Joonsang Baek
2017Defending Application Cache Integrity of Android Runtime.
Jia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem
2017Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper).
Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang, Wen-Yu Kao
2017Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers.
Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao
2017Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy.
Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard
2017Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard
2017Efficient Certificate-Based Signature and Its Aggregation.
Xinxin Ma, Jun Shao, Cong Zuo, Ru Meng
2017Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper).
Orhio Mark Creado, Phu Dung Le
2017Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun
2017Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption.
Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda
2017EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System.
Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu
2017Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite.
Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. V. Saraswathy, Zhe Liu
2017Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper).
Bei Liang, Aikaterini Mitrokotsa
2017Generic Framework for Attribute-Based Group Signature.
Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch
2017Group-Based Source-Destination Verifiable Encryption with Blacklist Checking.
Zhongyuan Yao, Yi Mu, Guomin Yang
2017Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook.
Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, Sebastian Schrittwieser
2017Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing.
Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang
2017Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang, Jin Li
2017How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection.
Tingmin Wu, Derek Wang, Sheng Wen, Yang Xiang
2017Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings
Joseph K. Liu, Pierangela Samarati
2017IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng
2017Key Bit-Dependent Attack on Protected PKC Using a Single Trace.
Bo-Yeon Sim, Dong-Guk Han
2017Linearly Homomorphic Signatures with Designated Entities.
Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang
2017Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper).
Yong Tang, Yi Wang, Shuning Wei, Bo Yu, Qiang Yang
2017New Proof for BKP IBE Scheme and Improvement in the MIMC Setting.
Song Luo, Lu Yan, Jian Weng, Zheng Yang
2017On the Security of In-Vehicle Hybrid Network: Status and Challenges.
Tianxiang Huang, Jianying Zhou, Yi Wang, Anyu Cheng
2017Optimizing Online Permutation-Based AE Schemes for Lightweight Applications.
Yu Sasaki, Kan Yasuda
2017Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Junbin Fang
2017Outsourcing Encrypted Excel Files.
Yanan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao
2017Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption.
Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang
2017Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries.
Yanjun Shen, Peng Zhang
2017Reasoning About Trust and Belief Change on a Social Network: A Formal Approach.
Aaron Hunter
2017Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016.
Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi
2017Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper).
Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah
2017Secure Communications in Unmanned Aerial Vehicle Network.
Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Yanan Li
2017TTP-free Fair Exchange of Digital Signatures with Bitcoin.
Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li
2017The ECCA Security of Hybrid Encryptions.
Honglong Dai, Jinyong Chang, Zhenduo Hou, Maozhi Xu
2017The KDM-CCA Security of REACT.
Jinyong Chang, Honglong Dai, Maozhi Xu
2017Toward Fuzz Test Based on Protocol Reverse Engineering.
Jun Cai, Jian-Zhen Luo, Jianliang Ruan, Yan Liu
2017Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper).
Lu Ren, Rui Chang, Qing Yin, Wei Wang
2017Verifiable Range Query Processing for Cloud Computing.
Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang, Jie Xiong