


default search action
CSS 2022: Xi'an, China
- Xiaofeng Chen, Jian Shen

, Willy Susilo
:
Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings. Lecture Notes in Computer Science 13547, Springer 2022, ISBN 978-3-031-18066-8
Cryptography and Its Applications
- Qitian Sheng, Jiaojiao Wu, Jianfeng Wang

:
Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead. 3-16 - Yuqian Ma, Yongliu Ma, Yidan Liu, Qingfeng Cheng:

A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare. 17-31 - Yong Wang, Hao Xie

, Ruyi Wang:
Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q). 32-47 - Yifei Li

, Yinghui Zhang
, Wei Liu
, Jianting Ning
, Dong Zheng
:
A Collaborative Access Control Scheme Based on Incentive Mechanisms. 48-55 - Zijian Bao

, Debiao He
, Yulin Liu
, Cong Peng
, Qi Feng
, Min Luo
:
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing. 56-70 - Zhenhua Liu, Yuanju Ma, Yaxin Niu, Jingwan Gong, Baocang Wang:

Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage. 71-85
Data Security
- Yao Liu, Zhonghao Yuan, Yunhan Hu:

FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers. 89-108 - Shujiang Xu, Fansheng Wang, Lianhai Wang, Xu Chang, Tongfeng Yang, Weijun Yang:

A Method of Traceless File Deletion for NTFS File System. 109-117 - Lifei Wei, Jihai Liu, Lei Zhang, Wuji Zhang:

Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting. 118-132 - Meixia Miao, Panru Wu, Yunling Wang:

Multi-user Verifiable Database with Efficient Keyword Search. 133-146 - Jie Xiao, Hui Huang, Chenhuang Wu, Qunshan Chen, Zhenjie Huang

:
A Blockchain-Based Collaborative Auditing Scheme for Cloud Storage. 147-159
Attack and Defense Techniques
- Wei Zong, Yang-Wai Chow

, Willy Susilo
:
High Quality Audio Adversarial Examples Without Using Psychoacoustics. 163-177 - Zian Liu, Chao Chen, Leo Yu Zhang, Shang Gao:

Working Mechanism of Eternalblue and Its Application in Ransomworm. 178-191 - Yuliang Lin, Rongmao Chen, Yi Wang, Baosheng Wang, Lin Liu:

Substitution Attacks Against Sigma Protocols. 192-208 - Lixia Xie, Xueou Li, Hongyu Yang, Liang Zhang:

A Multi-stage APT Attack Detection Method Based on Sample Enhancement. 209-216 - Hongyu Yang, Haiyun Yang, Liang Zhang:

VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer. 217-224 - Yaping Chi, Defan Xue, Ziyan Yue, Zhiqiang Wang, Liang Jiaming:

Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning. 225-243 - Mengfan Xu, Xinghua Li:

FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme. 244-258 - Zhengyang Liu, Xiaoyu Zhang, Chenyang Chen, Shen Lin, Jingjin Li:

Membership Inference Attacks Against Robust Graph Neural Network. 259-273
Network Security and Its Applications
- Haibo Tian, Yanchuan Wen, Fangguo Zhang

, Yunfeng Shao, Bingshuai Li:
A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice. 277-292 - Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang:

A Defect Level Assessment Method Based on Weighted Probability Ensemble. 293-300 - Yifan Zhang

, Yuping Zhou
, Yu Hu
, Hui Huang
:
A Decentralized Ride-Hailing Mode Based on Blockchain and Attribute Encryption. 301-313 - Ruozhou Zuo

, Haibo Tian, Zhiyuan An
, Fangguo Zhang
:
Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on Lattice. 314-326 - Meeraj Mahendra Gawde, Gaurav Choudhary

, Shishir Kumar Shandilya, Rizwan Ur Rahman, Hoonyong Park, Ilsun You:
Improvised Model for Blockchain in Distributed Cloud Environment. 327-341 - Hui Li, Xuelian Li, Juntao Gao, Runsong Wang:

Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model. 342-357 - Yuanzhen Liu, Yanbo Yang, Jiawei Zhang, Baoshan Li:

Design of Anti Machine Learning Malicious Node System Based on Blockchain. 358-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














