


default search action
19th ICICS 2017: Beijing, China
- Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu:

Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings. Lecture Notes in Computer Science 10631, Springer 2018, ISBN 978-3-319-89499-7
Formal Analysis and Randomness Test
- Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng:

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. 3-16 - Jiahui Shen, Tianyu Chen, Lei Wang, Yuan Ma:

An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. 17-35
Signature Scheme and Key Management
- Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li:

FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. 39-50 - Huorong Li, Wuqiong Pan

, Jingqiang Lin, Wangzhao Cheng, Bingyu Li:
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. 51-62
Algorithms
- Wenwen Wang, Kewei Lv:

The Reductions for the Approximating Covering Radius Problem. 65-74 - Jianing Liu, Kewei Lv:

Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates. 75-80 - Bei Liang

, Aikaterini Mitrokotsa
:
Distributed Pseudorandom Functions for General Access Structures in NP. 81-87 - Shuang Qiu

, Rui Zhang, Yongbin Zhou, Hailong Zhang:
Reducing Randomness Complexity of Mask Refreshing Algorithm. 88-101
Applied Cryptography
- Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:

A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. 105-117 - Xueqing Wang, Biao Wang, Rui Xue:

Two Efficient Tag-Based Encryption Schemes on Lattices. 118-131 - Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang:

Compact (Targeted Homomorphic) Inner Product Encryption from LWE. 132-140 - Zhedong Wang, Xiong Fan, Mingsheng Wang:

Compact Inner Product Encryption from LWE. 141-153 - Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue

, Xianhui Lu, Dingding Jia:
Towards Tightly Secure Deterministic Public Key Encryption. 154-161 - Qingsong Zhao, Qingkai Zeng, Ximeng Liu:

Efficient Inner Product Encryption with Simulation-Based Security. 162-171 - Gang Yu, Xiaoxiao Ma, Zhenfu Cao

, Weihua Zhu, Guang Zeng:
Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. 172-179 - Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu:

Practical Large Universe Attribute-Set Based Encryption in the Standard Model. 180-191 - Xinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen:

Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. 192-204 - Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe:

Identity-Based Group Encryption Revisited. 205-209 - Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue

, Bei Liang:
Compact Hierarchical IBE from Lattices in the Standard Model. 210-221
Attacks and Attacks Defense
- Ievgen Kabin

, Zoya Dyka
, Dan Kreiser
, Peter Langendörfer
:
Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. 225-235 - Wenjie Yang

, Jian Weng
, Futai Zhang:
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. 236-247 - Soyoung Ahn, Hyang-Sook Lee

, Seongan Lim
, Ikkwon Yie:
A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys. 248-254 - Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu:

Practical Range Proof for Cryptocurrency Monero with Provable Security. 255-262
Wireless Sensor Network Security
- Feiyang Peng

, Zhihong Liu
, Yong Zeng, Jialei Wang:
Modeling Key Infection in Large-Scale Sensor Networks. 265-275 - Meigen Huang, Bin Yu:

SDN-Based Secure Localization in Heterogeneous WSN. 276-287
Security Applications
- Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:

A PUF and Software Collaborative Key Protection Scheme. 291-303 - Xueping Liang, Sachin Shetty

, Deepak K. Tosh
, Peter Foytik, Lingchen Zhang:
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. 304-310
Malicious Code Defense and Mobile Security
- Mingyue Liang, Zhoujun Li, Qiang Zeng, Zhejun Fang:

Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization. 313-324 - Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia:

A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks. 325-335
IoT Security
- Yu Li, Yazhe Wang, Yuan Zhang:

SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. 339-351 - Dali Zhu, Wenjing Rong, Di Wu, Na Pang:

Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. 352-362 - Ming Yuan, Ye Li, Zhoujun Li:

Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. 363-373 - Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han:

A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. 374-384
Healthcare and Industrial Control System Security
- Xueping Liang, Sachin Shetty

, Juan Zhao, Daniel Bowden, Danyi Li, Jihong Liu:
Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems. 387-398 - Changji Wang, Yuan Yuan, Shengyi Jiang:

P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System. 399-411 - Feng Xiao, Enhong Chen, Qiang Xu:

S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol. 412-423
Privacy Protection
- Tianying Chen, Haiyan Kang:

Research on Clustering-Differential Privacy for Express Data Release. 427-437 - Ying Xia, Yu Huang, Xu Zhang, Hae-Young Bae:

Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation. 438-445 - Hai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian, Laifeng Lu:

Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy. 446-458 - Zhenyu Chen

, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li:
The De-anonymization Method Based on User Spatio-Temporal Mobility Trace. 459-471 - Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu:

Privacy-Preserving Disease Risk Test Based on Bloom Filters. 472-486
Engineering Issues of Crypto
- Kazuki Yoneyama, Shogo Kimura:

Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency. 489-501 - Lingchen Li

, Wenling Wu, Lei Zhang:
Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. 502-508 - Anirban Basu

, Rui Xu, Juan Camilo Corena, Shinsaku Kiyomoto:
Hypercubes and Private Information Retrieval. 509-515 - Lei Xu

, Chungen Xu
, Joseph K. Liu, Cong Zuo, Peng Zhang:
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. 516-528 - Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:

High-Performance Symmetric Cryptography Server with GPU Acceleration. 529-540 - Yuntao Wang

, Yoshinori Aono, Tsuyoshi Takagi:
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. 541-553
Cloud and E-commerce Security
- Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang:

A Security-Enhanced vTPM 2.0 for Cloud Computing. 557-569 - Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval:

SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. 570-581 - XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu:

A Cross-Modal CCA-Based Astroturfing Detection Approach. 582-592
Security Protocols
- Zhiqiang Xu, Debiao He, Xinyi Huang:

Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. 595-605 - Gaurav Sharma, Rajeev Anand Sahu

, Veronika Kuchta, Olivier Markowitch, Suman Bala:
Authenticated Group Key Agreement Protocol Without Pairing. 606-618
Network Security
- Rong Fan

, Yaoyao Chang:
Machine Learning for Black-Box Fuzzing of Network Protocols. 621-632 - Jing Yang, Liming Wang, Zhen Xu:

A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. 633-645 - Zhi Wang, Meiqi Tian, Chunfu Jia:

An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift. 646-660 - Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu:

Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. 661-673 - Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem

:
Pollution Attacks Identification in Structured P2P Overlay Networks. 674-686

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














