| 2018 | A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation. Keita Emura, Takuya Hayashi |
| 2018 | A Simple Algorithm for Estimating Distribution Parameters from n n -Dimensional Randomized Binary Responses. Staal Amund Vinterbo |
| 2018 | Anonymous yet Traceable Strong Designated Verifier Signature. Veronika Kuchta, Rajeev Anand Sahu, Vishal Saraswat, Gaurav Sharma, Neetu Sharma, Olivier Markowitch |
| 2018 | Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP. Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin |
| 2018 | Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking. Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell |
| 2018 | Conditional Cube Searching and Applications on Trivium-Variant Ciphers. Xiaojuan Zhang, Meicheng Liu, Dongdai Lin |
| 2018 | Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment. Carolina Adaros Boye, Paul Kearney, Mark B. Josephs |
| 2018 | Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection. Fangjie Jiang, Quanwei Cai, Le Guan, Jingqiang Lin |
| 2018 | Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic. Pierangelo Lombardo, Salvatore Saeli, Federica Bisio, Davide Bernardi, Danilo Massa |
| 2018 | Function-Dependent Commitments for Verifiable Multi-party Computation. Lucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann |
| 2018 | Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT. Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy |
| 2018 | How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification. Kemal Bicakci, Enes Altuncu, Muhammet Sakir Sahkulubey, Hakan Ezgi Kiziloz, Yusuf Uzunay |
| 2018 | ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software. Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Hai-Xin Duan |
| 2018 | Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings Liqun Chen, Mark Manulis, Steve A. Schneider |
| 2018 | Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails. Daniël Bodden |
| 2018 | Lumus: Dynamically Uncovering Evasive Android Applications. Vitor Monte Afonso, Anatoli Kalysch, Tilo Müller, Daniela Oliveira, André Grégio, Paulo Lício de Geus |
| 2018 | Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices. Yanting Zhang, Jianwei Liu, Zongyang Zhang, Yang Hu |
| 2018 | Multi-key Homomorphic Proxy Re-Encryption. Satoshi Yasuda, Yoshihiro Koseki, Ryo Hiromasa, Yutaka Kawai |
| 2018 | Offline Assisted Group Key Exchange. Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang |
| 2018 | On Constructing Pairing-Free Identity-Based Encryptions. Xin Wang, Bei Liang, Shimin Li, Rui Xue |
| 2018 | Platform-Independent Secure Blockchain-Based Voting System. Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au |
| 2018 | Practical Attacks on Relational Databases Protected via Searchable Encryption. Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin |
| 2018 | Privacy in Crowdsourcing: A Systematic Review. Abdulwhab Alkharashi, Karen Renaud |
| 2018 | Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs. Cecilia Boschini, Jan Camenisch, Gregory Neven |
| 2018 | Secure Code Execution: A Generic PUF-Driven System Architecture. Stephan Kleber, Florian Unterstein, Matthias Hiller, Frank Slomka, Matthias Matousek, Frank Kargl, Christoph Bösch |
| 2018 | Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy. Yingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu |
| 2018 | Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions. Masahito Ishizaka, Kanta Matsuura |
| 2018 | Verifiable Decryption for Fully Homomorphic Encryption. Fucai Luo, Kunpeng Wang |