ISPEC C

23 papers

YearTitle / Authors
2025Information Security Practice and Experience - 19th International Conference, ISPEC 2024, Wuhan, China, October 25-27, 2024, Proceedings
Zhe Xia, Jiageng Chen
2024A Comparative Analysis of Phishing Tools: Features and Countermeasures.
Rishikesh Sahay, Weizhi Meng, Wenjuan Li
2024A New Construction of Leakage-Resilient Identity-Based Encryption Scheme.
Zirui Qiao, Ran Xu, Yonghui Lu, Yanwei Zhou, Bo Yang
2024A Secure Incentive Mechanism in Blockchain-Based Mobile Crowdsensing.
Mingwu Zhang, Qi Zou, Bo Yang
2024An eID-Based Privacy-Enhanced Public Transportation Ticket System.
Kanagaratnam Anojjan, Weizhi Meng, Brooke Kidmose, Yu Wang
2024Breaking GEA-Like Stream Ciphers with Lower Time Cost.
Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang
2024Controlled Multi-client Functional Encryption for Flexible Access Control.
Mingwu Zhang, Yulu Zhong, Yifei Wang, Yuntao Wang
2024Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling Scenario.
Hailong Zhang
2024Efficient Large-Scale Multi-party Computation Based on Garbled Circuit.
Zhusen Liu, Jiafei Wu, Zhe Liu
2024Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber.
Peng Chen, Chi Cheng, Jinnuo Li, Tianqing Zhu
2024From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework.
Liwei Liu, Zijian Liu, Na Ruan
2024Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption.
Kaiming Chen, Atsuko Miyaji, Jiageng Chen
2024Isogeny-Based Password-Authenticated Key Exchange Based on Shuffle Algorithm.
Congrong Peng, Cong Peng, Xiaolin Yang, Qingcai Luo, Min Luo
2024Lattice-Based Universal Designated Multi-verifiers Signature Scheme.
Yanhua Zhang, Willy Susilo, Yan Chen, Fuchun Guo, Jiaming Wen
2024OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT.
Yudi Zhang, Yumei Li, Mingwu Zhang, Willy Susilo
2024Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning.
Hong Qin, Debiao He, Qi Feng, Xiaolin Yang, Qingcai Luo
2024Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures.
Mengsi Wu, Pei Li, Jiageng Chen, Shixiong Yao
2024Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC.
Kangkang Shi, Jiongjiong Ren, Shaozhen Chen
2024SNIPER: Detect Complex Attacks Accurately from Traffic.
Changlong Yu, Bo Zhang, Boyu Kuang, Anmin Fu
2024Secure Federated Distillation Framework for Encrypted Traffic Classification.
Long Teng, Qi Feng, Wei Zhao, Min Luo, Debiao He
2024Shrinkable Ring Signatures: It Wasn't Them!
Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto
2024TriNT: A Framework for ROV Identification Based on Triplet.
Yujing Liu, Jiangbin Chen, Shuhui Chen
2024Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware Detection.
Md Mashrur Arifin, Troy Suyehara Tolman, Jyh-haw Yeh