


default search action
25th ICICS 2023: Tianjin, China
- Ding Wang

, Moti Yung
, Zheli Liu
, Xiaofeng Chen
:
Information and Communications Security - 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14252, Springer 2023, ISBN 978-981-99-7355-2
Symmetric-Key Cryptography
- Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi:

SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA. 3-18 - Xuanyu Liang, Yincen Chen, Ling Song, Qianqian Yang, Zhuohui Feng, Tianrong Huang:

Improved Related-Key Rectangle Attack Against the Full AES-192. 19-34 - Sijia Liu, Min Luo, Cong Peng, Debiao He:

Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM. 35-50 - Jiqiang Lu, Can Wang:

Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher. 51-68 - Arghya Bhattacharjee

, Ritam Bhaumik, Avijit Dutta, Eik List:
PAE: Towards More Efficient and BBB-Secure AE from a Single Public Permutation. 69-87
Public-Key Cryptography
- Guoqing Zhou, Maozhi Xu:

A Polynomial-Time Attack on G2SIDH. 91-109 - Hongyuan Qu

, Guangwu Xu
:
Improvements of Homomorphic Secure Evaluation of Inverse Square Root. 110-127 - Shuaishuai Li, Cong Zhang

, Dongdai Lin:
Oblivious Transfer from Rerandomizable PKE. 128-145 - Xiaoling Yu, Yuntao Wang:

Forward Secure Lattice-Based Ring Signature Scheme in the Standard Model. 146-158
Applied Cryptography
- Takeshi Nakai, Kazumasa Shinagawa:

Secure Multi-party Computation with Legally-Enforceable Fairness. 161-178 - Xiaogang Cao, Fenghua Li, Kui Geng, Yingke Xie, Wenlong Kou:

On-Demand Allocation of Cryptographic Computing Resource with Load Prediction. 179-196 - Iraklis Leontiadis, Serge Vaudenay:

Private Message Franking with After Opening Privacy. 197-214 - Huan Zou, Yuting Xiao, Rui Zhang:

Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction. 215-234 - Amirreza Hamidi, Hossein Ghodosi:

Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography. 235-246
Authentication and Authorization
- Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe:

PiXi: Password Inspiration by Exploring Information. 249-266 - Ningjing Fan

, Dongdong Zhao, Hucheng Liao:
Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification. 267-283 - Minqiu Tian, Fenghua Li, Kui Geng, Wenlong Kou, Chao Guo:

A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things. 284-301 - Yuting Zuo

, Li Xu
, Yuexin Zhang, Zhaozhe Kang, Chenbin Zhao:
BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social Networks. 302-313
Privacy and Anonymity
- Futai Zou, Yuelin Hu, Wenliang Xu, Yue Wu:

Link Prediction-Based Multi-Identity Recognition of Darknet Vendors. 317-332 - Jianli Bai, Xiaowu Zhang, Xiangfu Song, Hang Shao, Qifan Wang, Shujie Cui, Giovanni Russello:

CryptoMask: Privacy-Preserving Face Recognition. 333-350 - Cong Zhang

, Weiran Liu, Bolin Ding, Dongdai Lin:
Efficient Private Multiset ID Protocols. 351-369 - Yuwei Xu, Lei Wang, Jiangfeng Li, Kehui Song, Yali Yuan:

Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services. 370-382 - Jiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan, Xiaofei Wu, Lu Zhou, Liming Fang

:
An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV. 383-395
Security and Privacy of AI
- Soohyeon Choi

, Manar Mohaisen
, Daehun Nyang
, David Mohaisen
:
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors. 399-417 - Huangxinyue Wu, Haoran Li, Jinhong Zhang, Wei Zhou, Lei Guo, Yunyun Dong:

Multi-scale Features Destructive Universal Adversarial Perturbations. 418-434 - Hong Huang, Xingyang Li, Wenjian He:

Pixel-Wise Reconstruction of Private Data in Split Federated Learning. 435-450 - Xubo Yang

, Linsen Li
, Yenan Chen
:
Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments. 451-466 - Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao:

Black-Box Fairness Testing with Shadow Models. 467-484 - Wenyue Zheng, Ximeng Liu, Yuyang Wang, Xuanwei Lin:

Graph Unlearning Using Knowledge Distillation. 485-501 - Renyang Liu

, Jinhong Zhang
, Haoran Li
, Jin Zhang
, Yuanyu Wang
, Wei Zhou
:
AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings. 502-518 - Lichao Su, Bin Wu, Chenwei Dai, Huan Luo, Jian Chen:

Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference. 519-533 - Hewei Yu, Pengfei Shi:

A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation. 534-549
Blockchain and Cryptocurrencies
- Yuwei Xu, Haoyu Wang, Junyu Zeng:

SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains. 553-570 - Yifu Geng, Bo Qin, Qin Wang

, Wenchang Shi, Qianhong Wu:
Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy. 571-589 - Yuhan Song

, Yuefei Zhu
, Fushan Wei
:
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions. 590-607 - Shan Jin

, Yong Li
, Xi Chen
, Ruxian Li:
Blockchain Based Publicly Auditable Multi-party Computation with Cheater Detection. 608-626 - Johan Hagelskjar Sjursen, Weizhi Meng

, Wei-Yang Chiu
:
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. 627-644 - Erya Jiang, Bo Qin, Qin Wang

, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi, Wenyi Tang:
BDTS: Blockchain-Based Data Trading System. 645-664 - Chang Xu, Shiyao Zhang, Liehuang Zhu, Xiaodong Shen, Xiaoming Zhang:

Illegal Accounts Detection on Ethereum Using Heterogeneous Graph Transformer Networks. 665-680
System and Network security
- Loganathan Parthipan

, Liqun Chen
, Christopher J. P. Newton
, Yunpeng Li
, Fei Liu, Donghui Wang:
DRoT: A Decentralised Root of Trust for Trusted Networks. 683-701 - Yeqi Fu, Yongzhi Liu, Qian Zhang, Zhou Yang, Xiarun Chen, Chenglin Xie, Weiping Wen:

Finding Missing Security Operation Bugs via Program Slicing and Differential Check. 702-718 - Kassem Bagher

, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi:
TimeClave: Oblivious In-Enclave Time Series Processing System. 719-737 - Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang:

Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios. 738-749 - Hongyu Yang, Jinjiao Zhang, Ze Hu, Liang Zhang, Xiang Cheng:

A Fake News Detection Method Based on a Multimodal Cooperative Attention Network. 750-760

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














