| 2021 | A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance. Dongdong Yang, Baopeng Ye, Yuling Chen, Huiyu Zhou, Xiaobin Qian |
| 2021 | A Novel Certificateless Multi-signature Scheme over NTRU Lattices. Xinjian Chen, Qiong Huang, Jianye Huang |
| 2021 | A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework. Huijie Yang, Tianqi Zhou, Chen Wang, Debiao He |
| 2021 | Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK. Yingjie Zhang, Lijun Lyu, Kexin Qiao, Zhiyu Zhang, Siwei Sun, Lei Hu |
| 2021 | Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem. Xiulan Li, Yanbin Pan, Chengliang Tian |
| 2021 | DenseGAN: A Password Guessing Model Based on DenseNet and PassGAN. Chaohui Fu, Ming Duan, Xunhai Dai, Qiang Wei, Qianqiong Wu, Rui Zhou |
| 2021 | EPFSTO-ARIMA: Electric Power Forced Stochastic Optimization Predicting Based on ARIMA. Guangxia Xu, YuQing Xu |
| 2021 | Efficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes Again. Kaiwei Zhang, Ailun Ma, Shanxiang Lyu, Jiabo Wang, Shuting Lou |
| 2021 | Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security. Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida |
| 2021 | Enhanced Mixup Training: a Defense Method Against Membership Inference Attack. Zongqi Chen, Hongwei Li, Meng Hao, Guowen Xu |
| 2021 | Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs. Ruturaj K. Vaidya, Prasad A. Kulkarni, Michael R. Jantz |
| 2021 | Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation. Tao Ye, Yongzhuang Wei, Lingcheng Li, Enes Pasalic |
| 2021 | Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings Robert H. Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang |
| 2021 | Isogeny Computation on Twisted Jacobi Intersections. Zhi Hu, Lin Wang, Zijian Zhou |
| 2021 | Lightweight EdDSA Signature Verification for the Ultra-Low-Power Internet of Things. Johann Großschädl, Christian Franck, Zhe Liu |
| 2021 | Message-Restriction-Free Commitment Scheme Based on Lattice Assumption. Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji |
| 2021 | OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control. Yanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal |
| 2021 | Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix. Yunxiao Yang, Xuan Shen, Bing Sun |
| 2021 | PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud Storage. Shanshan Li, Chunxiang Xu |
| 2021 | Penetration rate-equivalent inertia time constant function identification method of renewable energy power system. Baoyu Zhai, Xing Li, Qi Yang, Wanru Li, Ruizhe Sun, Bingtuan Gao |
| 2021 | Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo |
| 2021 | Privacy-Preserving Support Vector Machines with Flexible Deployment and Error Correction. Weican Huang, Ning Ding |
| 2021 | Ring Trapdoor Redactable Signatures from Lattice. Shao-Jun Yang, Xinyi Huang, Mingmei Zheng, Jinhua Ma |
| 2021 | StrGAN for Generating Enhanced Samples. Junfeng Wu, Jinwei Wang, Junjie Zhao, Xiangyang Luo |
| 2021 | WADS: A Webshell Attack Defender Assisted by Software-Defined Networks. Beiyuan Yu, Jianwei Liu, Ziyu Zhou |