| 2018 | (k, l)-Clustering for Transactional Data Streams Anonymization. Jimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty |
| 2018 | A Generic Construction of Integrated Secure-Channel Free PEKS and PKE. Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi |
| 2018 | A Generic Framework for Accountable Optimistic Fair Exchange Protocol. Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan |
| 2018 | A New Design of Online/Offline Signatures Based on Lattice. Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang |
| 2018 | A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin |
| 2018 | A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks. Jing Xu, Yuqiang Zhang, Fei Xu, Lei Zhou, Shuanglin Jiang |
| 2018 | A Two-Stage Classifier Approach for Network Intrusion Detection. Wei Zong, Yang-Wai Chow, Willy Susilo |
| 2018 | Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba |
| 2018 | An Almost Non-interactive Order Preserving Encryption Scheme. Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen |
| 2018 | An Efficient and Provably Secure Private Polynomial Evaluation Scheme. Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu |
| 2018 | Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. Entao Luo, Guojun Wang, Kun Tang, Quanyou Zhao, Chen He, Liyong Guo |
| 2018 | CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case. Lucas Schabhüser, Denis Butin, Johannes Buchmann |
| 2018 | Certificateless Public Key Signature Schemes from Standard Algorithms. Zhaohui Cheng, Liqun Chen |
| 2018 | Compact Ring Signature in the Standard Model for Blockchain. Hao Ren, Peng Zhang, QingChun ShenTu, Joseph K. Liu, Tsz Hon Yuen |
| 2018 | Constrained (Verifiable) Pseudorandom Function from Functional Encryption. Pratish Datta |
| 2018 | DSH: Deniable Secret Handshake Framework. Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu |
| 2018 | Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes. Sergiu Carpov, Oana Stan |
| 2018 | Efficient Traceable Oblivious Transfer and Its Applications. Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang, Yangguang Tian |
| 2018 | Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption. Takato Hirano, Yutaka Kawai, Yoshihiro Koseki |
| 2018 | Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices. Yuichi Komano, Zhengfan Xia, Takeshi Kawabata, Hideo Shimizu |
| 2018 | Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures. Bagus Santoso, Taiyo Yamaguchi, Tomoyuki Ohkubo |
| 2018 | Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai |
| 2018 | Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings Chunhua Su, Hiroaki Kikuchi |
| 2018 | Keyword-Based Delegable Proofs of Storage. Binanda Sengupta, Sushmita Ruj |
| 2018 | Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits. Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu |
| 2018 | Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. Fucai Luo, Kunpeng Wang, Changlu Lin |
| 2018 | M-ORAM Revisited: Security and Construction Updates. Karin Sumongkayothin |
| 2018 | Macros Finder: Do You Remember LOVELETTER? Hiroya Miura, Mamoru Mimura, Hidema Tanaka |
| 2018 | Non-adaptive Group-Testing Aggregate MAC Scheme. Shoichi Hirose, Junji Shikata |
| 2018 | Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks. Yi-Ning Liu, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu |
| 2018 | Recovering Memory Access Sequence with Differential Flush+Reload Attack. Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, Jian Wang |
| 2018 | Regulating IoT Messages. Alban Gabillon, Emmanuel Bruno |
| 2018 | Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE. Yuntao Wang, Thomas Wunderer |
| 2018 | Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. Sabyasachi Dutta, Nishant Nikam, Sushmita Ruj |
| 2018 | Seeing Is Believing: Authenticating Users with What They See and Remember. Wayne Chiu, Kuo-Hui Yeh, Akihito Nakamura |
| 2018 | TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones. Weizhi Meng, Zhe Liu |
| 2018 | T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks. Bo-Yeon Sim, Kyu Young Choi, Dukjae Moon, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han |
| 2018 | Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection. Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser |
| 2018 | Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, Jin Li |
| 2018 | Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification. Venkata Udaya Sameer, Ruchira Naskar |