


default search action
19th ISPEC 2024: Wuhan, China
- Zhe Xia

, Jiageng Chen
:
Information Security Practice and Experience - 19th International Conference, ISPEC 2024, Wuhan, China, October 25-27, 2024, Proceedings. Lecture Notes in Computer Science 15053, Springer 2025, ISBN 978-981-97-9052-4 - Long Teng, Qi Feng, Wei Zhao, Min Luo, Debiao He:

Secure Federated Distillation Framework for Encrypted Traffic Classification. 1-19 - Yujing Liu, Jiangbin Chen, Shuhui Chen:

TriNT: A Framework for ROV Identification Based on Triplet. 20-32 - Yanhua Zhang, Willy Susilo

, Yan Chen, Fuchun Guo, Jiaming Wen:
Lattice-Based Universal Designated Multi-verifiers Signature Scheme. 33-54 - Hailong Zhang

:
Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling Scenario. 55-74 - Tuong Ngoc Nguyen

, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Shrinkable Ring Signatures: It Wasn't Them! 75-93 - Kangkang Shi

, Jiongjiong Ren
, Shaozhen Chen:
Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC. 94-111 - Congrong Peng

, Cong Peng
, Xiaolin Yang, Qingcai Luo, Min Luo
:
Isogeny-Based Password-Authenticated Key Exchange Based on Shuffle Algorithm. 112-132 - Zirui Qiao, Ran Xu, Yonghui Lu, Yanwei Zhou, Bo Yang:

A New Construction of Leakage-Resilient Identity-Based Encryption Scheme. 133-150 - Peng Chen, Chi Cheng, Jinnuo Li, Tianqing Zhu:

Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber. 151-167 - Kaiming Chen

, Atsuko Miyaji
, Jiageng Chen
:
Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption. 168-185 - Zheng Wu, Lin Ding

, Zhengting Li, Xinhai Wang:
Breaking GEA-Like Stream Ciphers with Lower Time Cost. 186-204 - Changlong Yu, Bo Zhang, Boyu Kuang, Anmin Fu:

SNIPER: Detect Complex Attacks Accurately from Traffic. 205-221 - Liwei Liu, Zijian Liu, Na Ruan:

From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework. 222-239 - Zhusen Liu, Jiafei Wu, Zhe Liu:

Efficient Large-Scale Multi-party Computation Based on Garbled Circuit. 240-257 - Mengsi Wu

, Pei Li
, Jiageng Chen
, Shixiong Yao
:
Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures. 258-272 - Md Mashrur Arifin

, Troy Suyehara Tolman
, Jyh-haw Yeh
:
Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware Detection. 273-291 - Kanagaratnam Anojjan, Weizhi Meng

, Brooke Kidmose
, Yu Wang:
An eID-Based Privacy-Enhanced Public Transportation Ticket System. 292-309 - Hong Qin

, Debiao He
, Qi Feng
, Xiaolin Yang, Qingcai Luo:
Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning. 310-328 - Mingwu Zhang, Yulu Zhong, Yifei Wang, Yuntao Wang:

Controlled Multi-client Functional Encryption for Flexible Access Control. 329-346 - Mingwu Zhang, Qi Zou, Bo Yang:

A Secure Incentive Mechanism in Blockchain-Based Mobile Crowdsensing. 347-364 - Rishikesh Sahay, Weizhi Meng

, Wenjuan Li:
A Comparative Analysis of Phishing Tools: Features and Countermeasures. 365-382 - Yudi Zhang

, Yumei Li
, Mingwu Zhang
, Willy Susilo
:
OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT. 383-402

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














