default search action
DSC 2021: Aizuwakamatsu, Japan
- IEEE Conference on Dependable and Secure Computing, DSC 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021. IEEE 2021, ISBN 978-1-7281-7534-8
- Wei-Chieh Chao, Chung-Kuan Chen, Chen-Mou Cheng:
Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables. 1-2 - Sumit Kumar Debnath, Kouichi Sakurai, Kunal Dey, Nibedita Kundu:
Secure Outsourced Private Set Intersection with Linear Complexity. 1-8 - Ruisi Wu, Wen-Kang Jia, Xufang Wang:
Header-Translation based Flow Aggregation for Scattered Address Allocating SDNs. 1-8 - Wenjuan Li, Weizhi Meng, Javier Parra-Arnau, Kim-Kwang Raymond Choo:
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. 1-8 - Hongxun Huang, Zi-Yuan Liu, Raylin Tso:
Partially Blind ECDSA Scheme and Its Application to Bitcoin. 1-8 - Albert Guan, Chia-Mei Chen:
A Novel Verification scheme for Resisting Password Guessing Attacks. 1-2 - Shenghao Su, Cheng Guo, Pengxu Tian, Xinyu Tang:
Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario. 1-7 - Marc Fischer, Oliver Riedel, Armin Lechler, Alexander Verl:
Arithmetic Coding for Floating-Point Numbers. 1-8 - Yuan Li, Haiyan Wang, Shulan Wang, Yong Ding:
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing. 1-8 - Junqing Lu, Rongxin Qi, Jian Shen:
A Novel Dynamic Group Signature with Membership Privacy. 1-5 - Yu-Hsin Hung, Bing-Jhong Jheng, Hong-Wei Li, Wen-Yang Lai, Sanoop Mallissery, Yu-Sung Wu:
Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay. 1-8 - Qian Mei, Hu Xiong, Yanan Zhao, Kuo-Hui Yeh:
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating. 1-8 - Kui Zhu, Yongjun Ren, Qingfeng Zhu:
A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance. 1-6 - Po-Chu Hsu, Atsuko Miyaji:
Verifiable M+lst-Price Auction without Manager. 1-8 - Hao Wang, Chunpeng Ge, Zhe Liu:
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective. 1-8 - Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang, Yu-Chi Chen:
Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability. 1-2 - Yi-Fan Tseng, Shih-Jie Gao:
Efficient Subset Predicate Encryption for Internet of Things. 1-2 - Hiroaki Kikuchi, Kazuki Eto, Kazushi Waki, Takafumi Mori:
Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition. 1-7 - Chun-I Fan, Yi-Fan Tseng, Cheng-Chun Feng:
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model. 1-8 - Shan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen, Shiuhpyng Shieh:
EC-Model: An Evolvable Malware Classification Model. 1-8 - Yang Zhao, Ankang Ruan, Guohang Dan, Jicheng Huang, Yi Ding:
Efficient Multi-Authority Attribute-based Signcryption with Constant-Size Ciphertext. 1-8 - Ruei-Hau Hsu, Hsiang-Shian Fan, Lu-Chin Wang:
SGD2: Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5G. 1-8 - Feihong Yin, Li Yang, Yuchen Wang, Jiahao Dai:
IoT ETEI: End-to-End IoT Device Identification Method. 1-8 - Yalian Qian, Xueya Xia, Jian Shen:
A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems. 1-5 - Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien-Ming Chen:
On the Construction of a Post-Quantum Blockchain. 1-8 - Dong Zhang, Qing Fan, Hongyi Qiao, Min Luo:
A Public-key Encryption with Multi-keyword Search Scheme for Cloud-based Smart Grids. 1-6 - Takato Hirano, Yutaka Kawai, Yoshihiro Koseki:
DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems. 1-8 - Shoma Tanaka, Takashi Matsunaka, Akira Yamada, Ayumu Kubota:
Phishing Site Detection Using Similarity of Website Structure. 1-8 - Xueya Xia, Sai Ji:
An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid. 1-2 - Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Pandu Rangan, Kouichi Sakurai:
A Distributed Ledger Management Mechanism for Storing and Selling Private Data. 1-8 - Ting-Le Zhu, Tzung-Her Chen:
A Patient-Centric Key Management Protocol for Healthcare Information System based on Blockchain. 1-5 - Xin Xie, Yu-Chi Chen:
Decentralized Data Aggregation: A New Secure Framework based on Lightweight Cryptographic Algorithms. 1-2 - Shiyi Yang, Peilun Wu, Hui Guo:
DualNet: Locate Then Detect Effective Payload with Deep Attention Network. 1-8 - Haoyang An, Jiageng Chen:
ExamChain: A Privacy-Preserving Onscreen Marking System based on Consortium Blockchain. 1-8 - Hung-Yu Chien:
Highly Efficient Anonymous IoT Authentication using Composite Hashing. 1-7 - Lyue Li, Amir Rezapour, Wen-Guey Tzeng:
A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space. 1-7 - Tatsuhiro Fukuda, Kazumasa Omote:
Efficient Blockchain-based IoT Firmware Update Considering Distribution Incentives. 1-8 - Yan-Ting Liu, Rung-Ching Chen, Christine Dewi:
Generate Realistic Traffic Sign Image using Deep Convolutional Generative Adversarial Networks. 1-6 - Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Kuo-Hui Yeh, Wensheng Gan, SK Hafizul Islam:
A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy. 1-8 - Yang Zhao, Guohang Dan, Ankang Ruan, Jicheng Huang, Hu Xiong:
A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks. 1-7 - Phuc Trinh Dinh, Minho Park:
BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud. 1-8 - Tieming Geng, Laurent Njilla, Chin-Tser Huang:
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification. 1-8 - Kai Ren Teo, Balamurali B. T., Jer-Ming Chen, Jianying Zhou:
Retrieving Input from Touch Interfaces via Acoustic Emanations. 1-8 - Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Perpetual Secret Sharing from Dynamic Data Structures. 1-8 - Wei-Yang Chiu, Weizhi Meng, Christian Damsgaard Jensen:
ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement. 1-8 - Qingfeng Zhu, Sai Ji, Qi Liu:
Privacy-Preserving Smart Road Pricing System in Smart Cities. 1-2 - Zhixin Zhao, Lu Zhou, Chunhua Su:
Systematic Research on Technology and Challenges of Lightning Network. 1-8 - Jing Xu, Fei Xu, Fanshu Ma, Lei Zhou, Shuanglin Jiang, Zhibo Rao:
Mining Web Usage Profiles from Proxy Logs: User Identification. 1-6 - Yi-Ming Chen, Chun-Hsien Yang, Guo-Chung Chen:
Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection. 1-8 - Nahid Bandi, Hesam Tajbakhsh, Morteza Analoui:
FastMove: Fast IP switching Moving Target Defense to mitigate DDOS Attacks. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.