default search action
19th ISPEC 2024: Wuhan, China
- Zhe Xia
, Jiageng Chen
:
Information Security Practice and Experience - 19th International Conference, ISPEC 2024, Wuhan, China, October 25-27, 2024, Proceedings. Lecture Notes in Computer Science 15053, Springer 2025, ISBN 978-981-97-9052-4 - Long Teng, Qi Feng, Wei Zhao, Min Luo, Debiao He:
Secure Federated Distillation Framework for Encrypted Traffic Classification. 1-19 - Yujing Liu, Jiangbin Chen, Shuhui Chen:
TriNT: A Framework for ROV Identification Based on Triplet. 20-32 - Yanhua Zhang, Willy Susilo, Yan Chen, Fuchun Guo, Jiaming Wen:
Lattice-Based Universal Designated Multi-verifiers Signature Scheme. 33-54 - Hailong Zhang
:
Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling Scenario. 55-74 - Tuong Ngoc Nguyen
, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Shrinkable Ring Signatures: It Wasn't Them! 75-93 - Kangkang Shi
, Jiongjiong Ren
, Shaozhen Chen:
Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC. 94-111 - Congrong Peng
, Cong Peng
, Xiaolin Yang, Qingcai Luo, Min Luo
:
Isogeny-Based Password-Authenticated Key Exchange Based on Shuffle Algorithm. 112-132 - Zirui Qiao, Ran Xu, Yonghui Lu, Yanwei Zhou, Bo Yang:
A New Construction of Leakage-Resilient Identity-Based Encryption Scheme. 133-150 - Peng Chen, Chi Cheng, Jinnuo Li, Tianqing Zhu:
Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber. 151-167 - Kaiming Chen
, Atsuko Miyaji
, Jiageng Chen
:
Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption. 168-185 - Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang:
Breaking GEA-Like Stream Ciphers with Lower Time Cost. 186-204 - Changlong Yu, Bo Zhang, Boyu Kuang, Anmin Fu:
SNIPER: Detect Complex Attacks Accurately from Traffic. 205-221 - Liwei Liu, Zijian Liu, Na Ruan:
From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework. 222-239 - Zhusen Liu, Jiafei Wu, Zhe Liu:
Efficient Large-Scale Multi-party Computation Based on Garbled Circuit. 240-257 - Mengsi Wu
, Pei Li
, Jiageng Chen
, Shixiong Yao
:
Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures. 258-272 - Md Mashrur Arifin
, Troy Suyehara Tolman
, Jyh-haw Yeh
:
Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware Detection. 273-291 - Kanagaratnam Anojjan, Weizhi Meng, Brooke Kidmose, Yu Wang:
An eID-Based Privacy-Enhanced Public Transportation Ticket System. 292-309 - Hong Qin
, Debiao He
, Qi Feng
, Xiaolin Yang, Qingcai Luo:
Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning. 310-328 - Mingwu Zhang, Yulu Zhong, Yifei Wang, Yuntao Wang:
Controlled Multi-client Functional Encryption for Flexible Access Control. 329-346 - Mingwu Zhang, Qi Zou, Bo Yang:
A Secure Incentive Mechanism in Blockchain-Based Mobile Crowdsensing. 347-364 - Rishikesh Sahay, Weizhi Meng, Wenjuan Li:
A Comparative Analysis of Phishing Tools: Features and Countermeasures. 365-382 - Yudi Zhang
, Yumei Li
, Mingwu Zhang
, Willy Susilo
:
OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT. 383-402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.