


default search action
5th FCS 2022: Kumasi, Ghana
- Emmanuel Ahene

, Fagen Li
:
Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings. Communications in Computer and Information Science 1726, Springer 2022, ISBN 978-981-19-8444-0
IoT Security
- Chunhua Jin, Chenhao Li, Wenyu Qin, Xiaobing Chen, Guanhua Chen:

A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT. 3-17 - Yangpeng Wang, Ling Xiong, Xianhua Niu, Yunxiang Wang, Dexin Liang:

A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles. 18-33 - Otuekong Ekpo

, Kate Takyi, Rose-Mary Owusuaa Mensah Gyening
:
LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building. 34-47 - Jingting Xue

, Shuqin Luo
, Lingjie Shi
, Xiaojun Zhang
, Chunxiang Xu
:
Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government. 48-68 - Xiaoguang Liu, Yingying Sun, Hao Dong:

A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things. 69-86
Artificial Intelligence and Cyber Security
- Zhonglin Liu

, Yong Fang
, Yijia Xu
:
Cross-site Scripting Threat Intelligence Detection Based on Deep Learning. 89-104 - Xiang Li, Ning Yang, Aidong Chen, Weifeng Liu, Xiaoxiao Liu, Na Huang:

Power Analysis Attack Based on Lightweight Convolutional Neural Network. 105-118 - Emmanuel Kwesi Baah

, Steven Yirenkyi
, Dominic Asamoah
, Stephen Opoku Oppong
, Edward Opoku-Mensah
, Benjamin Tei Partey
, Anthony Kingsley Sackey
, Oliver Kornyo
, Evans Obu
:
Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms. 119-133 - Yi Liu, Guoxiong Hu, Yudi Zhang, Mingwu Zhang:

SVFLS: A Secure and Verifiable Federated Learning Training Scheme. 134-148 - Yu Wang, Haomiao Yang, Jiasheng Li, Mengyu Ge:

A Pragmatic Label-Specific Backdoor Attack. 149-162 - Samuel Kelly Brew, Emmanuel Ahene

:
Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source. 163-179
Blockchain Technology and Application
- Egide Nkurunziza, Lawrence Tandoh, Issameldeen Elfadul, Mwitende Gervais:

AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-Based Smart Grid Environment. 183-197 - Sandro Amofa

, Jianbin Gao, Maame Gyamfua Asante-Mensah, Charles Roland Haruna, Xia Qi:
Blockchain-Based Patient-to-Patient Health Data Sharing. 198-210 - Xiangsong Zhang, Ming Yuan, Zhenhua Liu:

Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain. 211-225 - Motoya Ishimaki, Kazumasa Omote:

Ethereum Contract Honeypot Risk Analysis. 226-240 - Abigail Akosua Addobea

, Qianmu Li
, Isaac Amankona Obiri
, Jun Hou
:
A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains. 241-257
Cryptography
- Yulian Li, Hua Shen:

A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme. 261-274 - Chengrong Liu, Chunming Tang, Huiwen Jia:

New Trapdoor and Preimage Sampling on NTRU Lattice. 275-287 - Yang Yang, Bixia Yi, Yonghua Zhan, Minming Huang:

Secure EHR Sharing Scheme Based on Limited Sanitizable Signature. 288-303 - Yanyan Han, Yikun Zhou, Peng Li, Xinyang Liu:

A Rotating Multi-secret Color Visual Cryptography Scheme Based on Meaningful Shares. 304-323 - Zhenhua Liu, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang:

Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage. 324-345
Database Security
- Evans Ankomah

, Charles Roland Haruna
, Francis Xavier Kofi Akotoye
, Brighter Agyemang
, Kwame Opuni-Boachie Obour Agyekum
, Alexander Asante
, Lawrence Ephrim
, Alexander N. T. Kissiedu
:
A Comparative Analysis of Security Features and Concerns in NoSQL Databases. 349-364 - Xingpeng Tang, Jingwei Li:

Improving Online Restore Performance of Backup Storage via Historical File Access Pattern. 365-376 - Qikai Feng, Bai Liu:

Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing. 377-391
Quantum Cryptography
- Dongfen Li

, Jie Zhou, Xiaolong Yang, Yuqaio Tan, Yundan Zheng, Xiaofang Liu:
Quantum Information Splitting Scheme of Arbitrary Three-Qubit State by Using a Four-Qubit Cluster State and a Bell State. 395-409
Network Security
- Long Yin

, Jian Xu
, Heqiu Chai, Chen Wang:
A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System. 413-428

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














