


default search action
20th Inscrypt 2024: Kunming, China - Part I
- Dongdai Lin, Meiqin Wang, Moti Yung:

Information Security and Cryptology - 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I. Lecture Notes in Computer Science 15543, Springer 2025, ISBN 978-981-96-4730-9
Big Data and Cloud Security
- Zongmin Wang, Qiang Wang, Fucai Zhou, Jian Xu:

Revocable Registered Attribute-Based Keyword Search Supporting Fairness. 3-23 - Siyuan Ma, Yuewu Wang, Chunjing Kou, Peng Wang, Haotian Shi, Jiwu Jing:

HiddenStor: A Steganographic Storage System Built on Secret Sharing. 24-41 - Chenchen Wu

, Weijing You
, Li Xu
:
TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous. 42-62
Foundations of Cryptography
- Shuang Hu, Bingsheng Zhang, Cong Zhang, Kui Ren:

On the Relationship Between Public Key Primitives via Indifferentiability. 65-85 - Hongxiao Wang

, Siu-Ming Yiu
, Yanmin Zhao
, Zoe L. Jiang
, Min Xie
:
Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions. 86-105 - Ziyi Li, Ruida Wang, Xianhui Lu, Yao Cheng, Liming Gao:

From Signature with Re-randomizable Keys: Generic Construction of PDPKS. 106-125
Implementation of Cryptosystems
- Luoqi Chen, Yufeng Tang

, Liangju Zhao, Zheng Gong:
SIMD Optimizations of White-Box Block Cipher Implementations with the Self-equivalence Framework. 129-149 - Shilong You, Jianfeng Du, Zhu Wang, Aimin Yu:

When Is Multi-channel Better Than Single-Channel: A Case Study of Product-Based Multi-channel Fusion Attacks. 150-169
Key Exchange
- Li Duan

, Yong Li
:
Privacy-Preserving Certificate-Less Authenticated Key Exchange with Key Registration Privacy. 173-192 - Zhiwei Li, Jun Xu, Lei Hu:

An Improved Signal Leakage Attack Against DXL Key Exchange Protocol. 193-210 - Jiahao Liu, Yi Wang, Rongmao Chen, Xincheng Tang, Jinshu Su:

srCPace: Universally Composable PAKE with Subversion-Resilience. 211-231
AI and Security
- Haoyang Lu, Rui Zhang, Tong Kong:

Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT. 235-254 - Yifei Zhang, Zhenduo Hou, Yunkai Zou, Zhen Li, Ding Wang:

EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning. 255-276 - Hongyu Yang, Yunlong Wang, Ze Hu, Xiang Cheng:

A Binary Code Similarity Detection Method Based on Multi-source Contrastive Learning. 277-295 - Lixia Xie, Chenyang Wei, Hongyu Yang, Ze Hu, Xiang Cheng:

Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement. 296-315
Security Analysis
- Ruigang Liang

, Ying Cao
, Peiwei Hu
, Kai Chen
:
Attention-Based Decompilation Through Neural Machine Translation. 319-339 - Linyu Li, Lei Yu, Qingli Guo, Ruixuan Zhang, Can Yang, Jun Guan, Xiaorui Gong:

DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware. 340-359
Privacy-Enhancing Technologies
- Jiangang Lu, Yunfan Yang, Qinqin Wu, Benhan Li, Mingxin Lu:

Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid. 363-380 - Birou Gao, Rui Zhang, Yuting Xiao, Huan Zou:

NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets. 381-402 - Hongfa Ding

, Peiwang Fu, Heling Jiang
, Xuesong Li, Linjiang Wu
:
Clustering Coefficient Estimating of Distributed Graph Data Based on Shuffled Differential Privacy. 403-423
Watermarking
- Siyuan Yu, Ziqi Zhu, Rupeng Yang, Junqing Gong:

Public-Key Watermarkable PRFs with Dynamic Bounded Collusion. 427-443 - Wenhao Xu, Hequn Xian

:
A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning. 444-460 - Yuhao Lian, Ying Ouyang, Songsong Li, Deng Tang:

CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-Knowledge Proof. 461-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














