default search action
4th ICCCS 2018: Haikou, China
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III. Lecture Notes in Computer Science 11065, Springer 2018, ISBN 978-3-030-00011-0
Cloud Security
- Yongjun Ren, Yepeng Liu, Chengshan Qian:
Digital Continuity Guarantee Based on Data Consistency in Cloud Storage. 3-11 - Lixia Xie, Ruixin Wei, Yuguang Ning, Hongyu Yang:
Dynamic Risk Access Control Model for Cloud Platform. 12-22 - Mingming Wang, Lu-Ting Tian, Zhiguo Qu:
Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System. 23-31 - Honghao Zhou, Tinghuai Ma, Jing Jia, Yuan Tian, Mznah Al-Rodhaan:
EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension. 32-43 - Zhiliang Wang, Changping Zhou, Yang Yu, Xingang Shi, Xia Yin, Jiangyuan Yao:
Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning Method. 44-55 - Jiawei Liu, Yongfeng Huang:
Focused Crawler Framework Based on Open Search Engine. 56-68 - Faguo Wu, Wang Yao, Xiao Zhang, Zhiming Zheng, Wenhua Wang:
Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment. 69-78 - Xintao Duan, Jingjing Liu, En Zhang, Haoxian Song, Kai Jia:
Image Encryption and Compression Based on a VAE Generative Model. 79-89 - Jian Song, Bo-ru Xu, Guo-chao Zhang, Guangsong Li, Chuangui Ma, Ai-Jun Ge:
Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service. 90-100 - Xin Su, Weiqi Shi, Jiuchuan Lin, Xin Wang:
Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration. 101-112 - Lijuan Zheng, Linhao Zhang, Meng Cui, Jianyou Chen, Shaobo Yang, Zhaoxuan Li:
Medical Information Access Control Method Based on Weighted Information Entropy. 113-122 - Yang Xu, Ziwang Wang, Lei Huang, Xiaoyao Xie:
Modeling and Analysis of a Hybrid Authentication Protocol for VANET. 123-137 - Shuai Zhang, Zhiwei Gao, Li Cui:
Modeling and Data Analysis of the Balise System. 138-150 - Junshe Wang, Yuzi Yi, Hongbin Zhang, Ning Cao:
Network Attack Prediction Method Based on Threat Intelligence. 151-160 - Jianyi Liu, Fangyu Weng, Ru Zhang, Yunbiao Guo:
Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model. 161-173 - Yongjun Ren, Lin Zhou, Yepeng Liu, Xiaorui Zhang:
Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage. 174-183 - Changxu Wang, Jing Chu:
Privacy-Preserved Prediction for Mobile Application Adoption. 184-194 - Jilin Wang, Yingzi Chen, Xiaoqing Feng:
Privacy-Preserving Credit Scoring on Cloud. 195-205 - Chong Wang, Ke Zhou, Ronglei Wei:
QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage. 206-216 - Xiaotong Wu, Pingzeng Liu, Jianrui Ding, Changqing Song, Bangguo Li, Xueru Yu:
Research and Application of Traceability Model for Agricultural Products. 217-226 - Xiang Yu, Shuang Chen, Yanbo Li, Hui Lu, Le Wang:
Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description. 227-233 - Xiaolan Xie, Xiao Zhou, Tianwei Yuan:
Research on Trust Management Model in Cloud Manufacturing. 234-244 - Xinfeng Zhu, Zhihao Zhang, Yanling Wang, Guohai Wang:
Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment. 245-252 - Zhongliang Yang, Pengyu Zhang, Minyu Jiang, Yongfeng Huang, Yu-Jin Zhang:
RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model. 253-264 - Jingzhang Sun, Chunjie Cao, Hui Li:
Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical Environment. 265-276 - Ximing Li, Weizhao Chen, Yubin Guo, Senyang Zhang, Qiong Huang:
Secure File Storage System Among Distributed Public Clouds. 277-289 - Ge Suhui, Wan Quan, Sun Wenhui:
Security Strategy of Campus Network Data Center in Cloud Environment. 290-297 - Linghao Zhang, Sheng Wang, Wei Gan, Chao Tang, Jie Zhang, Huihui Liang:
SLIDE: An Efficient Secure Linguistic Steganography Detection Protocol. 298-309 - Yazhou Dong, Mengxing Huang, Di Wu, Xijun He, Zhaoqing Wang, Uzair Aslam Bhatti:
Study on the Development of U.S. Intercontinental Alliance Clean Renewable Energy Based on CA-DEA Model. 310-321 - Erxue Min, Jun Long, Qiang Liu, Jianjing Cui, Zhiping Cai, Junbo Ma:
SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection. 322-334 - Chunhua Li, Jiaqi Hu, Ke Zhou, Yuanzhang Wang, Hongyu Deng:
Using Blockchain for Data Auditing in Cloud Storage. 335-345
Encryption
- Mingfang Jiang, Guang Sun:
A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding. 349-358 - Wei Shen, Zhendong Wu, Jianwu Zhang:
A Face Privacy Protection Algorithm Based on Block Scrambling and Deep Learning. 359-369 - Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li:
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack. 370-382 - Qian Yin, Gang Luo:
A Hash-Based Public Key Cryptosystem. 383-392 - Juanmei Zhang, Zichen Li, Yafei Sun, Boya Liu, Yatao Yang:
A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm. 393-402 - Jin Han, Wen Long Xu, Yu Ting Jing:
A New Dependency Parsing Tree Generation Algorithm Based on the Semantic Dependency Relationship Between Words. 403-411 - Qing Ye, Mingxing Hu, Wei Gao, Yongli Tang:
A Novel Hierarchical Identity-Based Encryption Scheme from Lattices. 412-422 - Mingxing Hu, Qing Ye, Wei Gao, Yongli Tang:
A Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from Lattices. 423-434 - Hongjian Yin, Leyou Zhang, Yi Mu:
A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation. 435-446 - Jiajia Yang, Zhendong Wu, Jianwu Zhang:
A Robust Fingerprint Identification Method by Deep Learning with Gabor Filter Multidimensional Feature Expansion. 447-457 - Yun Tan, Jiaohua Qin, Ling Tan, Hao Tang, Xuyu Xiang:
A Survey on the New Development of Medical Image Security Algorithms. 458-467 - Yongli Tang, Mingming Wang, Zongqu Zhao, Qing Ye:
Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model. 468-478 - Hong Lai, Mingxing Luo, Li Tao, Fuyuan Xiao, Cheng Zhan, Xiaofang Hu:
An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic Maps. 479-489 - Jiaqing Mo, Zhongwang Hu, Yuhua Lin:
An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network. 490-505 - Bin Lu, Fenlin Liu, Ping Xu, Xin Ge:
Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation. 506-518 - Jinxia Yu, Chaochao Yang, Yongli Tang, Xixi Yan:
Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices. 519-527 - Shaobing Wu, Changmei Wang:
Big Data Security Framework Based on Encryption. 528-540 - Yi-Ru Sun, Gang Xu, Xiu-Bo Chen, Yi-Xian Yang:
Controlled Bidirectional Remote Preparation of Single- and Two-Qubit State. 541-553 - Qing Ye, Xiaomeng Yang, Xixi Yan, Zongqu Zhao:
Efficient Group Signature Scheme Over NTRU Lattice. 554-562 - Chujiao Ma, John A. Chandy:
Error Tolerant ASCA on FPGA. 563-572 - Yanhua Zhang, Yong Gan, Yifeng Yin, Huiwen Jia, Yinghui Meng:
Fuzzy Identity-Based Signature from Lattices for Identities in a Large Universe. 573-584 - Wenting Jiang, Zhongmiao Kang, Yan Chen:
Improvement of STDM Watermarking Algorithm Based on Watson Model. 585-595 - Leyou Zhang, Yilei Cui, Yi Mu:
Improving Privacy-Preserving CP-ABE with Hidden Access Policy. 596-605 - Hongguo Zhu, Xin Hai, Jiuchuan Lin:
Integral and Impossible Differential Cryptanalysis of RC6. 606-616 - Yanjun Song, Jing Zhang, Han Yan, Qianmu Li:
Multi-class Imbalanced Learning with One-Versus-One Decomposition: An Empirical Study. 617-628 - Li Li, Jier Yu, Bing Wang, Qili Zhou, Shanqing Zhang, Jianfeng Lu, Chin-Chen Chang:
Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography. 629-640 - Wenwei Tao, Song Liu, Yang Su, Chao Hu:
Power Network Vulnerability Detection Based on Improved Adaboost Algorithm. 641-650 - Jun Wu, Chunzhi Wang:
Privacy Preserving for Big Data Based on Fuzzy Set. 651-659 - Haibin Wang, Daomeng Pan, Wenjie Liu:
Quantum Private Comparison Based on Delegating Quantum Computation. 660-669 - Haishan Chen, Wien Hong, Jiangqun Ni, Tung-Shou Chen:
Reversible Data Hiding in Partially-Encrypted Images. 670-679 - Xin Tang, Gang Xu, Kun-Chang Li, Xiu-Bo Chen, Yi-Xian Yang:
Secure Multiparty Quantum Summation Based on d-Level Single Particles. 680-690 - Taiwo Blessing Ogunseyi, Cheng Yang:
Survey and Analysis of Cryptographic Techniques for Privacy Protection in Recommender Systems. 691-706 - Cong Li, Xiaoyuan Yang, Yazhou Liu, Xu An Wang:
The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability. 707-719
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.