NSS B

42 papers

YearTitle / Authors
2022A Beyond-5G Authentication and Key Agreement Protocol.
Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian, Valtteri Niemi
2022A Combination Reduction Algorithm and Its Application.
Wei Yang, Shao-Jun Yang, Wei Wu, Yong Zhao
2022A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks.
Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu, Leo Yu Zhang, Robin Doss
2022A First Look at Android Apps' Third-Party Resources Loading.
Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kâafar
2022A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches.
Kurt Friday, Elias Bou-Harb, Jorge Crichigno
2022A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.
Yang Hong, Lisong Wang, Weizhi Meng, Jian Cao, Chunpeng Ge, Qin Zhang, Rui Zhang
2022A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics.
Stuart W. Hall, Amin Sakzad, Sepehr Minagar
2022A Survey on IoT Vulnerability Discovery.
Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen, Jun Zhang
2022An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks.
Tianqi Zhou, Wenying Zheng, Haowen Tan
2022An Efficient Clustering-Based Privacy-Preserving Recommender System.
Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang, Xu Yang
2022An Efficient Lattice-Based Encrypted Search Scheme with Forward Security.
Xiaoling Yu, Lei Xu, Xin Huang, Chungen Xu
2022Attacker Attribution via Characteristics Inference Using Honeypot Data.
Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens
2022BSB: Bringing Safe Browsing to Blockchain Platform.
Zhuang Zhou, Cheng Tan, Shiyun Liu, Rongwei Yu, Siwei Wu, Shengwu Xiong
2022Blockchain Based Regulatory Technology Deployment for Real Estate Transaction.
Ru Ray Raymond Chao, Joseph K. Liu, Kai Su
2022Blockchain-Based Access Control for Secure Smart Industry Management Systems.
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras
2022CVallet: A Blockchain-Oriented Application Development for Education and Recruitment.
Zoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic, Wayne Yang
2022Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset.
Shuang Zhao, Jincheng Zhong, Shuhui Chen, Jianbing Liang
2022DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices.
Bo Yang, Yanchao Zhang, Dong Tong
2022Decentralized Access Control for Secure Microservices Cooperation with Blockchain.
Ning Xi, Yajie Li, Jin Liu
2022Detecting Contradictions from CoAP RFC Based on Knowledge Graph.
Xinguo Feng, Yanjun Zhang, Mark Huasong Meng, Sin G. Teo
2022Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.
Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam
2022Driver Locations Harvesting Attack on pRide.
Shyam Murthy, Srinivas Vivek
2022Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare.
Jianghua Liu, Lei Xu, Bruce Gu, Lei Cui, Fei Zhu
2022Enabling Secure Deduplication in Encrypted Decentralized Storage.
Bo Zhang, Helei Cui, Yaxing Chen, Xiaoning Liu, Zhiwen Yu, Bin Guo
2022Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings.
Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
2022Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.
Siqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah M. Erfani, Jeffrey Chan
2022Forward Traceability for Product Authenticity Using Ethereum Smart Contracts.
Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss
2022Geometric Range Searchable Encryption with Forward and Backward Security.
Mengwei Yang, Chungen Xu, Pan Zhang
2022Graph Intelligence Enhanced Bi-Channel Insider Threat Detection.
Wei Hong, Jiao Yin, Mingshan You, Hua Wang, Jinli Cao, Jianxin Li, Ming Liu
2022Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection.
Bhagyashri Tushir, Yuhong Liu, Behnam Dezfouli
2022Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning.
Yunhao Li, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, Hongyang Yan
2022Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings
Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar
2022Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks.
Mengling Liu, Man Ho Au
2022Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server.
Hongcheng Xie, Zizhuo Chen, Yu Guo, Qin Liu, Xiaohua Jia
2022RAIDER: Reinforcement-Aided Spear Phishing Detector.
Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone
2022Rebound Attacks on sfSKINNY Hashing with Automatic Tools.
Shun Li, Guozhen Liu, Phuong Pham
2022Reducing Intrusion Alert Trees to Aid Visualization.
Eric Ficke, Raymond M. Bateman, Shouhuai Xu
2022Strengthening the Security of AES Against Differential Fault Attack.
Anit Kumar Ghosal, Dipanwita Roychowdhury
2022Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset.
Lei Shi, Shanti Krishnan, Sheng Wen, Yang Xiang
2022The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning.
Han Xu, Priyadarsi Nanda, Jie Liang, Xiangjian He
2022Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach.
Yining Xie, Xin Kang, Tieyan Li, Cheng-Kang Chu, Haiguang Wang
2022Vulnerability Detection Using Deep Learning Based Function Classification.
Huihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu