ISC C

28 papers

YearTitle / Authors
2018A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation.
Keita Emura, Takuya Hayashi
2018A Simple Algorithm for Estimating Distribution Parameters from n n -Dimensional Randomized Binary Responses.
Staal Amund Vinterbo
2018Anonymous yet Traceable Strong Designated Verifier Signature.
Veronika Kuchta, Rajeev Anand Sahu, Vishal Saraswat, Gaurav Sharma, Neetu Sharma, Olivier Markowitch
2018Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP.
Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin
2018Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking.
Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell
2018Conditional Cube Searching and Applications on Trivium-Variant Ciphers.
Xiaojuan Zhang, Meicheng Liu, Dongdai Lin
2018Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment.
Carolina Adaros Boye, Paul Kearney, Mark B. Josephs
2018Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection.
Fangjie Jiang, Quanwei Cai, Le Guan, Jingqiang Lin
2018Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic.
Pierangelo Lombardo, Salvatore Saeli, Federica Bisio, Davide Bernardi, Danilo Massa
2018Function-Dependent Commitments for Verifiable Multi-party Computation.
Lucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann
2018Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT.
Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
2018How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification.
Kemal Bicakci, Enes Altuncu, Muhammet Sakir Sahkulubey, Hakan Ezgi Kiziloz, Yusuf Uzunay
2018ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software.
Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Hai-Xin Duan
2018Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings
Liqun Chen, Mark Manulis, Steve A. Schneider
2018Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails.
Daniël Bodden
2018Lumus: Dynamically Uncovering Evasive Android Applications.
Vitor Monte Afonso, Anatoli Kalysch, Tilo Müller, Daniela Oliveira, André Grégio, Paulo Lício de Geus
2018Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices.
Yanting Zhang, Jianwei Liu, Zongyang Zhang, Yang Hu
2018Multi-key Homomorphic Proxy Re-Encryption.
Satoshi Yasuda, Yoshihiro Koseki, Ryo Hiromasa, Yutaka Kawai
2018Offline Assisted Group Key Exchange.
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2018On Constructing Pairing-Free Identity-Based Encryptions.
Xin Wang, Bei Liang, Shimin Li, Rui Xue
2018Platform-Independent Secure Blockchain-Based Voting System.
Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au
2018Practical Attacks on Relational Databases Protected via Searchable Encryption.
Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
2018Privacy in Crowdsourcing: A Systematic Review.
Abdulwhab Alkharashi, Karen Renaud
2018Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs.
Cecilia Boschini, Jan Camenisch, Gregory Neven
2018Secure Code Execution: A Generic PUF-Driven System Architecture.
Stephan Kleber, Florian Unterstein, Matthias Hiller, Frank Slomka, Matthias Matousek, Frank Kargl, Christoph Bösch
2018Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy.
Yingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu
2018Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions.
Masahito Ishizaka, Kanta Matsuura
2018Verifiable Decryption for Fully Homomorphic Encryption.
Fucai Luo, Kunpeng Wang