Stop the war!
Остановите войну!
for scientists:
default search action
19th ICICS 2017: Beijing, China
- Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu:
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings. Lecture Notes in Computer Science 10631, Springer 2018, ISBN 978-3-319-89499-7
Formal Analysis and Randomness Test
- Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng:
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. 3-16 - Jiahui Shen, Tianyu Chen, Lei Wang, Yuan Ma:
An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. 17-35
Signature Scheme and Key Management
- Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li:
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. 39-50 - Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li:
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. 51-62
Algorithms
- Wenwen Wang, Kewei Lv:
The Reductions for the Approximating Covering Radius Problem. 65-74 - Jianing Liu, Kewei Lv:
Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates. 75-80 - Bei Liang, Aikaterini Mitrokotsa:
Distributed Pseudorandom Functions for General Access Structures in NP. 81-87 - Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang:
Reducing Randomness Complexity of Mask Refreshing Algorithm. 88-101
Applied Cryptography
- Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:
A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. 105-117 - Xueqing Wang, Biao Wang, Rui Xue:
Two Efficient Tag-Based Encryption Schemes on Lattices. 118-131 - Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang:
Compact (Targeted Homomorphic) Inner Product Encryption from LWE. 132-140 - Zhedong Wang, Xiong Fan, Mingsheng Wang:
Compact Inner Product Encryption from LWE. 141-153 - Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia:
Towards Tightly Secure Deterministic Public Key Encryption. 154-161 - Qingsong Zhao, Qingkai Zeng, Ximeng Liu:
Efficient Inner Product Encryption with Simulation-Based Security. 162-171 - Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng:
Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. 172-179 - Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:
Practical Large Universe Attribute-Set Based Encryption in the Standard Model. 180-191 - Xinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen:
Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. 192-204 - Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe:
Identity-Based Group Encryption Revisited. 205-209 - Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang:
Compact Hierarchical IBE from Lattices in the Standard Model. 210-221
Attacks and Attacks Defense
- Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. 225-235 - Wenjie Yang, Jian Weng, Futai Zhang:
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. 236-247 - Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie:
A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys. 248-254 - Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu:
Practical Range Proof for Cryptocurrency Monero with Provable Security. 255-262
Wireless Sensor Network Security
- Feiyang Peng, Zhihong Liu, Yong Zeng, Jialei Wang:
Modeling Key Infection in Large-Scale Sensor Networks. 265-275 - Meigen Huang, Bin Yu:
SDN-Based Secure Localization in Heterogeneous WSN. 276-287
Security Applications
- Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:
A PUF and Software Collaborative Key Protection Scheme. 291-303 - Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang:
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. 304-310
Malicious Code Defense and Mobile Security
- Mingyue Liang, Zhoujun Li, Qiang Zeng, Zhejun Fang:
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization. 313-324 - Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia:
A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks. 325-335
IoT Security
- Yu Li, Yazhe Wang, Yuan Zhang:
SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. 339-351 - Dali Zhu, Wenjing Rong, Di Wu, Na Pang:
Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. 352-362 - Ming Yuan, Ye Li, Zhoujun Li:
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. 363-373 - Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han:
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. 374-384
Healthcare and Industrial Control System Security
- Xueping Liang, Sachin Shetty, Juan Zhao, Daniel Bowden, Danyi Li, Jihong Liu:
Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems. 387-398 - Changji Wang, Yuan Yuan, Shengyi Jiang:
P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System. 399-411 - Feng Xiao, Enhong Chen, Qiang Xu:
S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol. 412-423
Privacy Protection
- Tianying Chen, Haiyan Kang:
Research on Clustering-Differential Privacy for Express Data Release. 427-437 - Ying Xia, Yu Huang, Xu Zhang, Hae-Young Bae:
Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation. 438-445 - Hai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian, Laifeng Lu:
Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy. 446-458 - Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li:
The De-anonymization Method Based on User Spatio-Temporal Mobility Trace. 459-471 - Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu:
Privacy-Preserving Disease Risk Test Based on Bloom Filters. 472-486
Engineering Issues of Crypto
- Kazuki Yoneyama, Shogo Kimura:
Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency. 489-501 - Lingchen Li, Wenling Wu, Lei Zhang:
Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. 502-508 - Anirban Basu, Rui Xu, Juan Camilo Corena, Shinsaku Kiyomoto:
Hypercubes and Private Information Retrieval. 509-515 - Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang:
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. 516-528 - Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
High-Performance Symmetric Cryptography Server with GPU Acceleration. 529-540 - Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi:
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. 541-553
Cloud and E-commerce Security
- Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang:
A Security-Enhanced vTPM 2.0 for Cloud Computing. 557-569 - Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval:
SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. 570-581 - XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu:
A Cross-Modal CCA-Based Astroturfing Detection Approach. 582-592
Security Protocols
- Zhiqiang Xu, Debiao He, Xinyi Huang:
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. 595-605 - Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala:
Authenticated Group Key Agreement Protocol Without Pairing. 606-618
Network Security
- Rong Fan, Yaoyao Chang:
Machine Learning for Black-Box Fuzzing of Network Protocols. 621-632 - Jing Yang, Liming Wang, Zhen Xu:
A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. 633-645 - Zhi Wang, Meiqi Tian, Chunfu Jia:
An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift. 646-660 - Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu:
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. 661-673 - Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem:
Pollution Attacks Identification in Structured P2P Overlay Networks. 674-686
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.