default search action
23rd ISC 2020: Bali, Indonesia
- Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan:
Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings. Lecture Notes in Computer Science 12472, Springer 2020, ISBN 978-3-030-62973-1
Public-Key Cryptography
- Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE from Quadratic Residuosity with Fast Encryption. 3-19 - Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. 20-38 - Rouzbeh Behnia, Attila Altay Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen:
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. 39-58 - Soma Murata, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone:
Public-PEZ Cryptography. 59-74 - Xin Chen, Liang Feng Zhang:
Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials. 75-91
Symmetric-Key Cryptography and Lattice
- Youle Xu, Qichun Wang:
Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance. 95-106 - Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid:
Integerwise Functional Bootstrapping on TFHE. 107-125
Attacks and Cryptanalysis
- Ryoma Ito:
Rotational Cryptanalysis of Salsa Core Function. 129-145 - Ge Cheng, Hui Xie, Dongliang Zhang:
Analyzing the Chain of Trust Model Based on Entity Dependence. 146-159 - Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, Jingzi Meng:
Evaluation on the Security of Commercial Cloud Container Services. 160-177 - Haoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia:
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel. 178-195
Malware Analysis
- Jamie Pont, Budi Arief, Julio C. Hernandez-Castro:
Why Current Statistical Approaches to Ransomware Detection Fail. 199-216 - Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
A Framework for Estimating Privacy Risk Scores of Mobile Apps. 217-233 - Jorge Sanz Maroto, Haoyu Liu, Paul Patras:
On the Struggle Bus: A Detailed Security Analysis of the m-tickets App. 234-252
Network and System Security
- Zuchao Ma, Liang Liu, Weizhi Meng:
ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks. 255-273 - Saihua Cai, Jinfu Chen, Xinru Li, Bo Liu:
Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints. 274-289 - Don Kuzhiyelil, Philipp Zieris, Marine Kadar, Sergey Tverdyshev, Gerhard Fohler:
Towards Transparent Control-Flow Integrity in Safety-Critical Systems. 290-311
Blokchain
- Abba Garba, Arne Bochem, Benjamin Leiding:
BlockVoke - Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust. 315-333 - Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. 334-351 - Xiaoqi Li, Ting Chen, Xiapu Luo, Jiangshan Yu:
Characterizing Erasable Accounts in Ethereum. 352-371 - Rujia Li, Qin Wang, Feng Liu, Qi Wang, David Galindo:
An Accountable Decryption System Based on Privacy-Preserving Smart Contracts. 372-390
Security Applications
- Mauro Conti, Pier Paolo Tricomi:
PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition. 393-408 - Alberto Blanco-Justicia, Josep Domingo-Ferrer:
Privacy-Preserving Computation of the Earth Mover's Distance. 409-423
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.