ISC C

30 papers

YearTitle / Authors
2022A Blockchain-Based Mutual Authentication Protocol for Smart Home.
Biwen Chen, Bo Tang, Shangwei Guo, Jiyun Yang, Tao Xiang
2022ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence.
Yan Lin Aung, Martín Ochoa, Jianying Zhou
2022Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay.
Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye
2022AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition.
Shaofeng Wang, Bo Lang, Nan Xiao, Yikai Chen
2022Batched Fully Homomorphic Encryption from TFHE.
Yuting Jiang, Jianghong Wei
2022Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.
Shijin Chen, Mingwu Zhang, Bo Yang
2022CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks.
Qian Chen, Zilong Wang, Yilin Zhou, Jiawei Chen, Dan Xiao, Xiaodong Lin
2022Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing.
Di Xiao, Xue Tan, Min Li
2022Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.
Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey Todd McDonald, Moti Yung
2022Daric: A Storage Efficient Payment Channel with Punishment Mechanism.
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64.
Lijun Lyu, Yi Tu, Yingjie Zhang
2022Dissecting Applications Uninstallers and Removers: Are They Effective?
Marcus Botacin, André Grégio
2022EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries.
Almuthanna Alageel, Sergio Maffeis
2022Efficient ECDSA-Based Adaptor Signature for Batched Atomic Swaps.
Binbin Tu, Min Zhang, Chen Yu
2022Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting.
Hanyu Li, Ying Gao
2022Efficient Scalar Multiplication on Koblitz Curves with Pre-computation.
Xiuxiu Li, Wei Yu, Kunpeng Wang
2022Further Cryptanalysis of a Type of RSA Variants.
Gongyu Shi, Geng Wang, Dawu Gu
2022GRUZ: Practical Resource Fair Exchange Without Blockchain.
Yongqing Xu, Kaiyi Zhang, Yu Yu
2022HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.
Longlong Sun, Hui Li, Shiwen Yu, Xindi Ma, Yanguo Peng, Jiangtao Cui
2022Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization.
Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li
2022Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings
Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
2022More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model.
Kyoichi Asano, Keita Emura, Atsushi Takayasu
2022OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal
2022Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs.
Yongge Wang, Qutaibah M. Malluhi
2022QUIC Protocol with Post-quantum Authentication.
Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang
2022Representing LLVM-IR in a Code Property Graph.
Alexander Küchler, Christian Banse
2022Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization.
Jianzhang Chen, Haibo Tian, Fangguo Zhang
2022The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64.
Yingying Li, Qichun Wang
2022Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security.
Marcus Botacin, André Grégio
2022Witness Encryption from Smooth Projective Hashing System.
Yuzhu Wang, Mingwu Zhang