default search action
5th FCS 2022: Kumasi, Ghana
- Emmanuel Ahene, Fagen Li:
Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings. Communications in Computer and Information Science 1726, Springer 2022, ISBN 978-981-19-8444-0
IoT Security
- Chunhua Jin, Chenhao Li, Wenyu Qin, Xiaobing Chen, Guanhua Chen:
A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT. 3-17 - Yangpeng Wang, Ling Xiong, Xianhua Niu, Yunxiang Wang, Dexin Liang:
A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles. 18-33 - Otuekong Ekpo, Kate Takyi, Rose-Mary Owusuaa Mensah Gyening:
LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building. 34-47 - Jingting Xue, Shuqin Luo, Lingjie Shi, Xiaojun Zhang, Chunxiang Xu:
Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government. 48-68 - Xiaoguang Liu, Yingying Sun, Hao Dong:
A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things. 69-86
Artificial Intelligence and Cyber Security
- Zhonglin Liu, Yong Fang, Yijia Xu:
Cross-site Scripting Threat Intelligence Detection Based on Deep Learning. 89-104 - Xiang Li, Ning Yang, Aidong Chen, Weifeng Liu, Xiaoxiao Liu, Na Huang:
Power Analysis Attack Based on Lightweight Convolutional Neural Network. 105-118 - Emmanuel Kwesi Baah, Steven Yirenkyi, Dominic Asamoah, Stephen Opoku Oppong, Edward Opoku-Mensah, Benjamin Tei Partey, Anthony Kingsley Sackey, Oliver Kornyo, Evans Obu:
Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms. 119-133 - Yi Liu, Guoxiong Hu, Yudi Zhang, Mingwu Zhang:
SVFLS: A Secure and Verifiable Federated Learning Training Scheme. 134-148 - Yu Wang, Haomiao Yang, Jiasheng Li, Mengyu Ge:
A Pragmatic Label-Specific Backdoor Attack. 149-162 - Samuel Kelly Brew, Emmanuel Ahene:
Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source. 163-179
Blockchain Technology and Application
- Egide Nkurunziza, Lawrence Tandoh, Issameldeen Elfadul, Mwitende Gervais:
AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-Based Smart Grid Environment. 183-197 - Sandro Amofa, Jianbin Gao, Maame Gyamfua Asante-Mensah, Charles Roland Haruna, Xia Qi:
Blockchain-Based Patient-to-Patient Health Data Sharing. 198-210 - Xiangsong Zhang, Ming Yuan, Zhenhua Liu:
Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain. 211-225 - Motoya Ishimaki, Kazumasa Omote:
Ethereum Contract Honeypot Risk Analysis. 226-240 - Abigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou:
A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains. 241-257
Cryptography
- Yulian Li, Hua Shen:
A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme. 261-274 - Chengrong Liu, Chunming Tang, Huiwen Jia:
New Trapdoor and Preimage Sampling on NTRU Lattice. 275-287 - Yang Yang, Bixia Yi, Yonghua Zhan, Minming Huang:
Secure EHR Sharing Scheme Based on Limited Sanitizable Signature. 288-303 - Yanyan Han, Yikun Zhou, Peng Li, Xinyang Liu:
A Rotating Multi-secret Color Visual Cryptography Scheme Based on Meaningful Shares. 304-323 - Zhenhua Liu, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang:
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage. 324-345
Database Security
- Evans Ankomah, Charles Roland Haruna, Francis Xavier Kofi Akotoye, Brighter Agyemang, Kwame Opuni-Boachie Obour Agyekum, Alexander Asante, Lawrence Ephrim, Alexander N. T. Kissiedu:
A Comparative Analysis of Security Features and Concerns in NoSQL Databases. 349-364 - Xingpeng Tang, Jingwei Li:
Improving Online Restore Performance of Backup Storage via Historical File Access Pattern. 365-376 - Qikai Feng, Bai Liu:
Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing. 377-391
Quantum Cryptography
- Dongfen Li, Jie Zhou, Xiaolong Yang, Yuqaio Tan, Yundan Zheng, Xiaofang Liu:
Quantum Information Splitting Scheme of Arbitrary Three-Qubit State by Using a Four-Qubit Cluster State and a Bell State. 395-409
Network Security
- Long Yin, Jian Xu, Heqiu Chai, Chen Wang:
A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System. 413-428
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.