default search action
25th ISC 2022: Bali, Indonesia
- Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan:
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings. Lecture Notes in Computer Science 13640, Springer 2022, ISBN 978-3-031-22389-1
Cryptography
- Yongge Wang, Qutaibah M. Malluhi:
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs. 3-19 - Hanyu Li, Ying Gao:
Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting. 20-39 - Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey Todd McDonald, Moti Yung:
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files. 40-52 - Yuzhu Wang, Mingwu Zhang:
Witness Encryption from Smooth Projective Hashing System. 53-72
Post-quantum Cryptography
- Kyoichi Asano, Keita Emura, Atsushi Takayasu:
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model. 75-83 - Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang:
QUIC Protocol with Post-quantum Authentication. 84-91 - Yuting Jiang, Jianghong Wei:
Batched Fully Homomorphic Encryption from TFHE. 92-109 - Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li:
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization. 110-130
Cryptanalysis
- Gongyu Shi, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. 133-152 - Yingying Li, Qichun Wang:
The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64. 153-161 - Xiuxiu Li, Wei Yu, Kunpeng Wang:
Efficient Scalar Multiplication on Koblitz Curves with Pre-computation. 162-172
Blockchain
- Binbin Tu, Min Zhang, Chen Yu:
Efficient ECDSA-Based Adaptor Signature for Batched Atomic Swaps. 175-193 - Jianzhang Chen, Haibo Tian, Fangguo Zhang:
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization. 194-213 - Yongqing Xu, Kaiyi Zhang, Yu Yu:
GRUZ: Practical Resource Fair Exchange Without Blockchain. 214-228 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Daric: A Storage Efficient Payment Channel with Punishment Mechanism. 229-249 - Biwen Chen, Bo Tang, Shangwei Guo, Jiyun Yang, Tao Xiang:
A Blockchain-Based Mutual Authentication Protocol for Smart Home. 250-265
Email and Web Security
- Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal:
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. 269-289 - Almuthanna Alageel, Sergio Maffeis:
EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries. 290-316
Malware
- Yan Lin Aung, Martín Ochoa, Jianying Zhou:
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence. 319-338 - Marcus Botacin, André Grégio:
Dissecting Applications Uninstallers and Removers: Are They Effective? 339-359 - Alexander Küchler, Christian Banse:
Representing LLVM-IR in a Code Property Graph. 360-380 - Marcus Botacin, André Grégio:
Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security. 381-389 - Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye:
Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay. 390-407
AI Security
- Shaofeng Wang, Bo Lang, Nan Xiao, Yikai Chen:
AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition. 411-421 - Longlong Sun, Hui Li, Shiwen Yu, Xindi Ma, Yanguo Peng, Jiangtao Cui:
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud. 422-442 - Lijun Lyu, Yi Tu, Yingjie Zhang:
Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64. 443-463 - Qian Chen, Zilong Wang, Yilin Zhou, Jiawei Chen, Dan Xiao, Xiaodong Lin:
CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks. 464-472 - Shijin Chen, Mingwu Zhang, Bo Yang:
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing. 473-490 - Di Xiao, Xue Tan, Min Li:
Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing. 491-508
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.