default search action
2nd FCS 2019: Xi'an, China
- Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu:
Frontiers in Cyber Security - Second International Conference, FCS 2019, Xi'an, China, November 15-17, 2019, Proceedings. Communications in Computer and Information Science 1105, Springer 2019, ISBN 978-981-15-0817-2
Symmetric Key Cryptography
- Li Kang, Leyou Zhang:
Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud. 3-18
Public Key Cryptography
- Xiaoxu Gao, Leyou Zhang, Gongcheng Hu:
Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation. 21-35 - Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
Cryptographic Reverse Firewalls for Identity-Based Encryption. 36-52 - Yuyan Guo, Mingming Jiang, Shimin Wei, Ming Xie, Mei Sun:
Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles. 53-64
Post-quantum Cryptography
- Emmanuel Ahene, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment. 67-83 - Fenghe Wang, Shaoquan Shi, Chunxiao Wang:
Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network Coding. 84-94 - Zilong Wang, Honggang Hu, Mengce Zheng, Jiehui Nan:
Symmetric Lattice-Based PAKE from Approximate Smooth Projective Hash Function and Reconciliation Mechanism. 95-106 - Yanhua Zhang, Yifeng Yin, Ximeng Liu, Qikun Zhang, Huiwen Jia:
Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation. 107-127 - Jiehui Nan, Mengce Zheng, Honggang Hu:
Post-Quantum Pseudorandom Functions from Mersenne Primes. 128-142
Signature
- Mingming Jiang, Jinqiu Hou, Yuyan Guo, Yan Wang, Shimin Wei:
An Efficient Proxy Re-Signature Over Lattices. 145-160 - Qiyu Wang, Jie Chen, Lishuang Zhuang:
Batch Verification of Linkable Ring Signature in Smart Grid. 161-176 - Juan Ren, Leyou Zhang:
Hierarchical Identity-Based Signature over Verifiable Random Function. 177-189
Attack and Behavior Detection
- Gongcheng Hu, Leyou Zhang:
Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved Method. 193-208 - Leizhang Wang, Quanbo Qu, Tuoyan Li, Yange Chen:
Implementing Attacks on the Approximate Greatest Common Divisor Problem. 209-227 - Yusheng Dai, Hui Li, Xing Rong, Yahong Li, Min Zheng:
M4D: A Malware Detection Method Using Multimodal Features. 228-238 - Lin Ding, Dawu Gu, Lei Wang:
New Key Recovery Attack on the MICKEY Family of Stream Ciphers. 239-249
Authenticated Key Agreement
- Jiehui Nan, Mengce Zheng, Zilong Wang, Honggang Hu:
A General Construction for Password-Based Authenticated Key Exchange from Witness PRFs. 253-267 - Mwitende Gervais, Liang Sun, Ke Wang, Fagen Li:
Certificateless Authenticated Key Agreement for Decentralized WBANs. 268-290
Blockchain
- Nabeil Eltayieb, Liang Sun, Ke Wang, Fagen Li:
A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain. 293-307 - Haiyong Yu, Juntao Gao, Tong Wu, Xuelian Li:
A Novel Fair and Verifiable Data Trading Scheme. 308-326 - Junfeng Tian, Xuan Jing, Ruifang Guo:
Public Audit Scheme of Shared Data Based on Blockchain. 327-344
System and Network Security
- Yanyan Han, Yanru He, Peihe Liu, Xiaoxuan Yan, Na Li:
A Hybrid Key Management Scheme for Wireless Sensor Network. 347-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.