ISPEC C

36 papers

YearTitle / Authors
2023A New Gadget Decomposition Algorithm with Less Noise Growth in HE Schemes.
Chao Liu, Bozhong Liu
2023A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability.
Yuchen Yin, Qingqing Gan, Cong Zuo, Ning Liu, Changji Wang, Yuning Jiang
2023A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS).
Hannes Salin, Lukasz Krzywiecki
2023BAHS: A Blockchain-Aided Hash-Based Signature Scheme.
Yalan Wang, Liqun Chen, Long Meng, Yangguang Tian
2023CVAR-FL IoV Intrusion Detection Framework.
Jia Zhao, Xinyu Rao, Jiqiang Liu, Yue Guo, Bokai Yang
2023Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities.
Sohto Chiku, Keisuke Hara, Junji Shikata
2023Cross-Border Data Security from the Perspective of Risk Assessment.
Na Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang
2023Cryptanalysis of Human Identification Protocol with Human-Computable Passwords.
Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj
2023DIDO: Data Provenance from Restricted TLS 1.3 Websites.
Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
2023Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G.
Rabeya Basri, Gour C. Karmakar, Joarder Kamruzzaman, S. H. Shah Newaz, Linh Nguyen, Muhammad Usman
2023FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations.
Tran Duc Luong, Vuong Minh Tien, Phan The Duy, Van-Hau Pham
2023Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings
Weizhi Meng, Zheng Yan, Vincenzo Piuri
2023IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures.
Yohei Watanabe, Naoto Yanai, Junji Shikata
2023Isogeny-Based Multi-signature Scheme.
Mathieu de Goyon, Atsuko Miyaji
2023Lever: Making Intensive Validation Practical on Blockchain.
Mingming Wang, Qianhong Wu
2023LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity.
Philipp Jakubeit, Andreas Peter, Maarten van Steen
2023MalXCap: A Method for Malware Capability Extraction.
Bikash Saha, Nanda Rani, Sandeep Kumar Shukla
2023Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations.
Tomoya Morooka, Yoshifumi Manabe, Kazumasa Shinagawa
2023Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su
2023Mitigating Sybil Attacks in Federated Learning.
Ahmed E. Samy, Sarunas Girdzijauskas
2023Multimodal Software Defect Severity Prediction Based on Sentiment Probability.
Ying Li, Yuhao Lin, Yongchao Zhong, Qiuling Yue, Jinglu Hu, Wenjie Wang, Huiyang Shi, Yuqing Zhang
2023Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy.
Sebastian Simon, Cezara Petrui, Carlos Pinzón, Catuscia Palamidessi
2023Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example.
Thomas Prantl, Simon Engel, Lukas Horn, Dennis Kaiser, Lukas Iffländer, André Bauer, Christian Krupitzer, Samuel Kounev
2023Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan
2023QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing.
Mahdieh Safarzadehvahed, Farzaneh Abazari, Fateme Shabani
2023Quantum Key Distribution as a Service and Its Injection into TLS.
Sergejs Kozlovics, Krisjanis Petrucena, Davis Larins, Juris Viksna
2023RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files.
P. Mohan Anand, P. V. Sai Charan, Hrushikesh Chunduri, Sandeep K. Shukla
2023Recovering Multi-prime RSA Keys with Erasures and Errors.
Guanghui Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao
2023SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Ajay Chandra Korlapati, Sanjeet Kumar Nayak, Partha Sarathi Chakraborty, Somanath Tripathy
2023Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition.
Samaneh Mohammadi, Sima Sinaei, Ali Balador, Francesco Flammini
2023Security Analysis of WAGE Against Division Property Based Cube Attack.
Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury
2023Tikuna: An Ethereum Blockchain Network Security Monitoring System.
Andrés Gómez Ramirez, Loui Al Sardy, Francis Gomez Ramirez
2023Transparent Security Method for Automating IoT Security Assessments.
Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning
2023When MPC in the Head Meets VC.
Li Liu, Puwen Wei
2023XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph.
Ngo Duc Hoang Son, Huynh Thai Thi, Phan The Duy, Van-Hau Pham
2023XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs.
Yuki Nakagawa, Mamoru Mimura