


default search action
25th ISC 2022: Bali, Indonesia
- Willy Susilo

, Xiaofeng Chen
, Fuchun Guo
, Yudi Zhang
, Rolly Intan:
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings. Lecture Notes in Computer Science 13640, Springer 2022, ISBN 978-3-031-22389-1
Cryptography
- Yongge Wang

, Qutaibah M. Malluhi
:
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs. 3-19 - Hanyu Li, Ying Gao:

Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting. 20-39 - Mark Yampolskiy

, Lynne Graves
, Jacob Gatlin
, Jeffrey Todd McDonald
, Moti Yung
:
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files. 40-52 - Yuzhu Wang, Mingwu Zhang

:
Witness Encryption from Smooth Projective Hashing System. 53-72
Post-quantum Cryptography
- Kyoichi Asano

, Keita Emura
, Atsushi Takayasu
:
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model. 75-83 - Manohar Raavi

, Simeon Wuthier
, Pranav Chandramouli
, Xiaobo Zhou
, Sang-Yoon Chang
:
QUIC Protocol with Post-quantum Authentication. 84-91 - Yuting Jiang

, Jianghong Wei
:
Batched Fully Homomorphic Encryption from TFHE. 92-109 - Zhao Chen, Xianhui Lu, Dingding Jia

, Bao Li:
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization. 110-130
Cryptanalysis
- Gongyu Shi

, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. 133-152 - Yingying Li, Qichun Wang

:
The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64. 153-161 - Xiuxiu Li

, Wei Yu
, Kunpeng Wang:
Efficient Scalar Multiplication on Koblitz Curves with Pre-computation. 162-172
Blockchain
- Binbin Tu

, Min Zhang
, Chen Yu:
Efficient ECDSA-Based Adaptor Signature for Batched Atomic Swaps. 175-193 - Jianzhang Chen, Haibo Tian, Fangguo Zhang

:
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization. 194-213 - Yongqing Xu

, Kaiyi Zhang
, Yu Yu
:
GRUZ: Practical Resource Fair Exchange Without Blockchain. 214-228 - Arash Mirzaei, Amin Sakzad

, Jiangshan Yu
, Ron Steinfeld
:
Daric: A Storage Efficient Payment Channel with Punishment Mechanism. 229-249 - Biwen Chen

, Bo Tang, Shangwei Guo
, Jiyun Yang
, Tao Xiang
:
A Blockchain-Based Mutual Authentication Protocol for Smart Home. 250-265
Email and Web Security
- Yanjun Shen, Bin Yu, Shangqi Lai

, Xingliang Yuan
, Shifeng Sun
, Joseph K. Liu
, Surya Nepal
:
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. 269-289 - Almuthanna Alageel, Sergio Maffeis

:
EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries. 290-316
Malware
- Yan Lin Aung

, Martín Ochoa
, Jianying Zhou
:
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence. 319-338 - Marcus Botacin

, André Grégio
:
Dissecting Applications Uninstallers and Removers: Are They Effective? 339-359 - Alexander Küchler

, Christian Banse
:
Representing LLVM-IR in a Code Property Graph. 360-380 - Marcus Botacin

, André Grégio
:
Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security. 381-389 - Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye:

Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay. 390-407
AI Security
- Shaofeng Wang, Bo Lang

, Nan Xiao
, Yikai Chen:
AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition. 411-421 - Longlong Sun, Hui Li

, Shiwen Yu, Xindi Ma
, Yanguo Peng
, Jiangtao Cui
:
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud. 422-442 - Lijun Lyu

, Yi Tu
, Yingjie Zhang
:
Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64. 443-463 - Qian Chen

, Zilong Wang
, Yilin Zhou, Jiawei Chen, Dan Xiao, Xiaodong Lin
:
CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks. 464-472 - Shijin Chen, Mingwu Zhang

, Bo Yang
:
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing. 473-490 - Di Xiao

, Xue Tan, Min Li
:
Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing. 491-508

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














