ISPEC C

40 papers

YearTitle / Authors
2018(k, l)-Clustering for Transactional Data Streams Anonymization.
Jimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty
2018A Generic Construction of Integrated Secure-Channel Free PEKS and PKE.
Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi
2018A Generic Framework for Accountable Optimistic Fair Exchange Protocol.
Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan
2018A New Design of Online/Offline Signatures Based on Lattice.
Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang
2018A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion.
Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin
2018A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks.
Jing Xu, Yuqiang Zhang, Fei Xu, Lei Zhou, Shuanglin Jiang
2018A Two-Stage Classifier Approach for Network Intrusion Detection.
Wei Zong, Yang-Wai Chow, Willy Susilo
2018Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation.
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
2018An Almost Non-interactive Order Preserving Encryption Scheme.
Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen
2018An Efficient and Provably Secure Private Polynomial Evaluation Scheme.
Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu
2018Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.
Entao Luo, Guojun Wang, Kun Tang, Quanyou Zhao, Chen He, Liyong Guo
2018CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.
Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018Certificateless Public Key Signature Schemes from Standard Algorithms.
Zhaohui Cheng, Liqun Chen
2018Compact Ring Signature in the Standard Model for Blockchain.
Hao Ren, Peng Zhang, QingChun ShenTu, Joseph K. Liu, Tsz Hon Yuen
2018Constrained (Verifiable) Pseudorandom Function from Functional Encryption.
Pratish Datta
2018DSH: Deniable Secret Handshake Framework.
Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu
2018Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes.
Sergiu Carpov, Oana Stan
2018Efficient Traceable Oblivious Transfer and Its Applications.
Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang, Yangguang Tian
2018Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption.
Takato Hirano, Yutaka Kawai, Yoshihiro Koseki
2018Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices.
Yuichi Komano, Zhengfan Xia, Takeshi Kawabata, Hideo Shimizu
2018Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures.
Bagus Santoso, Taiyo Yamaguchi, Tomoyuki Ohkubo
2018Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai
2018Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
Chunhua Su, Hiroaki Kikuchi
2018Keyword-Based Delegable Proofs of Storage.
Binanda Sengupta, Sushmita Ruj
2018Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.
Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu
2018Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.
Fucai Luo, Kunpeng Wang, Changlu Lin
2018M-ORAM Revisited: Security and Construction Updates.
Karin Sumongkayothin
2018Macros Finder: Do You Remember LOVELETTER?
Hiroya Miura, Mamoru Mimura, Hidema Tanaka
2018Non-adaptive Group-Testing Aggregate MAC Scheme.
Shoichi Hirose, Junji Shikata
2018Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks.
Yi-Ning Liu, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu
2018Recovering Memory Access Sequence with Differential Flush+Reload Attack.
Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, Jian Wang
2018Regulating IoT Messages.
Alban Gabillon, Emmanuel Bruno
2018Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE.
Yuntao Wang, Thomas Wunderer
2018Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM.
Sabyasachi Dutta, Nishant Nikam, Sushmita Ruj
2018Seeing Is Believing: Authenticating Users with What They See and Remember.
Wayne Chiu, Kuo-Hui Yeh, Akihito Nakamura
2018TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones.
Weizhi Meng, Zhe Liu
2018T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks.
Bo-Yeon Sim, Kyu Young Choi, Dukjae Moon, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han
2018Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection.
Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser
2018Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, Jin Li
2018Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification.
Venkata Udaya Sameer, Ruchira Naskar