


default search action
17th ISPEC 2022: Taipei, Taiwan
- Chunhua Su

, Dimitris Gritzalis, Vincenzo Piuri:
Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings. Lecture Notes in Computer Science 13620, Springer 2022, ISBN 978-3-031-21279-6
Blockchain
- Bodi Bodi, Wei-Yang Chiu

, Weizhi Meng
:
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System. 3-20 - Yi-Hsiu Lee, Zi-Yuan Liu

, Raylin Tso
, Yi-Fan Tseng
:
Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance. 21-38 - Yu-Chen Liao, Raylin Tso

, Zi-Yuan Liu
, Yi-Fan Tseng
:
Blockchain-Based Confidential Payment System with Controllable Regulation. 39-56 - August Lykke Thomsen, Bastian Preisel, Victor Rodrigues Andersen, Wei-Yang Chiu

, Weizhi Meng
:
Designing Enhanced Robust 6G Connection Strategy with Blockchain. 57-74 - Zheng Yao Ng

, Iftekhar Salam
:
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data. 75-92 - Yi Zhang, Zhonghui Ge, Yu Long, Dawu Gu:

UCC: Universal and Committee-based Cross-chain Framework. 93-111
Security for Critical Infrastructure
- Juan Christian

, Luis Paulino, Alan Oliveira de Sá
:
A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response. 115-139 - Md. Rakibul Hasan Talukder

, Md. Al Amin
, Indrajit Ray:
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry. 140-157
IoT Security
- Subir Halder, Thomas Newe:

Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT. 161-178 - Kyusuk Han

, Eiman Al Nuaimi, Shamma Al Blooshi, Rafail Psiakis, Chan Yeob Yeun:
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment. 179-196 - Yinqin Huang

, Cheng Dai
, Wei-Che Chien
:
Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems. 197-212 - Pegah Nikbakht Bideh

:
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks. 213-230
Software Security
- Gheorghe Balan

, Dragos Teodor Gavrilut, Henri Luchian:
Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection. 233-251 - Yuki Mezawa, Mamoru Mimura

:
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection. 252-267 - Koyel Pramanick, Prasad A. Kulkarni:

Detect Compiler Inserted Run-time Security Checks in Binary Software. 268-286 - Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:

Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance. 287-305 - Ha Xuan Son, Barbara Carminati, Elena Ferrari:

PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation. 306-323
Network and Web Security
- Elisa Chiapponi

, Marc Dacier
, Olivier Thonnard, Mohamed Fangar, Vincent Rigal:
BADPASS: Bots Taking ADvantage of Proxy as a Service. 327-344 - Orhan Ermis, Christophe Feltus, Qiang Tang, Hoang Trang, Alexandre De Oliveira, Cu D. Nguyen, Alain Hirtzig:

A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks. 345-363 - Nguyen Huu Quyen

, Phan The Duy
, Nguyen Chi Vy
, Do Thi Thu Hien
, Van-Hau Pham
:
Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning. 364-381 - Xuan-Ha Nguyen

, Xuan-Duong Nguyen
, Kim-Hung Le
:
Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System. 382-396 - Jiang-Yi Zeng, Chi-Yuan Chen, Hsin-Hung Cho:

Detection of Adversarial Examples Based on the Neurons Distribution. 397-405
Authentication and Biometric Security
- Martin Georgiev, Simon Eberz, Ivan Martinovic:

Techniques for Continuous Touch-Based Authentication. 409-431 - George Tasopoulos

, Jinhui Li, Apostolos P. Fournaris
, Raymond K. Zhao
, Amin Sakzad
, Ron Steinfeld
:
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems. 432-451 - Slawomir Matelski:

Secure Human Identification Protocol with Human-Computable Passwords. 452-467 - Yuxiao Luo, Jianwei Tai, Xiaoqi Jia, Shengzhi Zhang:

Practical Backdoor Attack Against Speaker Recognition System. 468-484 - Guiwen Fu, Yanan Chen

, Zhen Wu, Qianlin Ye:
Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An Survey. 485-501
Cryptography
- Yen-Kang Fu, Jonathan Chang, David Jao:

Optimal Generic Attack Against Basic Boneh-Boyen Signatures. 505-519 - Nasratullah Ghafoori

, Atsuko Miyaji
:
Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs. 520-536 - Yuichi Komano

, Takaaki Mizuki
:
Physical Zero-Knowledge Proof Protocol for Topswops. 537-553 - Maharage Nisansala Sevwandi Perera

, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities. 554-572 - George Teseleanu

:
Sherlock Holmes Zero-Knowledge Protocols. 573-588 - Paul Cotan

, George Teseleanu
:
Continued Fractions Applied to a Family of RSA-like Cryptosystems. 589-605 - Jiaming Yuan

, Yingjiu Li
, Jianting Ning
, Robert H. Deng
:
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption. 606-623 - Yang Zhao, Zhaozhong Liu, Jingmin An, Guobin Zhu, Saru Kumari:

A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios. 624-639

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














