


default search action
14th ISPEC 2018: Tokyo, Japan
- Chunhua Su, Hiroaki Kikuchi:

Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings. Lecture Notes in Computer Science 11125, Springer 2018, ISBN 978-3-319-99806-0
System Security
- Hiroya Miura, Mamoru Mimura

, Hidema Tanaka:
Macros Finder: Do You Remember LOVELETTER? 3-18 - Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser

:
Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection. 19-36 - Venkata Udaya Sameer, Ruchira Naskar

:
Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification. 37-49 - Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen

:
Compact Ring Signature in the Standard Model for Blockchain. 50-65
Public Key Cryptography
- Tatsuya Suzuki, Keita Emura

, Toshihiro Ohigashi
:
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE. 69-86 - Jingjing Guo, Jianfeng Wang

, Zhiwei Zhang, Xiaofeng Chen:
An Almost Non-interactive Order Preserving Encryption Scheme. 87-100 - Fucai Luo, Kunpeng Wang, Changlu Lin:

Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. 101-115
Searchable and Functional Encryption
- Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu:

Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits. 119-140 - Pratish Datta:

Constrained (Verifiable) Pseudorandom Function from Functional Encryption. 141-159 - Takato Hirano, Yutaka Kawai, Yoshihiro Koseki:

Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption. 160-175
(Post-quantum) Signature Schemes
- Zhaohui Cheng, Liqun Chen

:
Certificateless Public Key Signature Schemes from Standard Algorithms. 179-197 - Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang:

A New Design of Online/Offline Signatures Based on Lattice. 198-212 - Lucas Schabhüser, Denis Butin

, Johannes Buchmann:
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case. 213-228 - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba

:
Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation. 229-247 - Bagus Santoso

, Taiyo Yamaguchi, Tomoyuki Ohkubo:
Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures. 248-262
Security Protocols
- Sergiu Carpov

, Oana Stan
:
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes. 265-281 - Binanda Sengupta

, Sushmita Ruj
:
Keyword-Based Delegable Proofs of Storage. 282-298 - Jia-Ch'ng Loh

, Swee-Huay Heng, Syh-Yuan Tan:
A Generic Framework for Accountable Optimistic Fair Exchange Protocol. 299-309
Network Security
- Wenjuan Li

, Weizhi Meng
, Yu Wang, Jinguang Han
, Jin Li:
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. 313-328 - Wei Zong

, Yang-Wai Chow
, Willy Susilo
:
A Two-Stage Classifier Approach for Network Intrusion Detection. 329-340 - Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li

, Guomin Yang
, Yong Yu
:
DSH: Deniable Secret Handshake Framework. 341-353
Authentication
- Shoichi Hirose

, Junji Shikata:
Non-adaptive Group-Testing Aggregate MAC Scheme. 357-372 - Weizhi Meng

, Zhe Liu:
TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones. 373-390 - Wayne Chiu

, Kuo-Hui Yeh
, Akihito Nakamura:
Seeing Is Believing: Authenticating Users with What They See and Remember. 391-403
Side-Channel Attacks
- Bo-Yeon Sim, Kyu Young Choi

, Dukjae Moon, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han:
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks. 407-423 - Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara

, Jian Wang:
Recovering Memory Access Sequence with Differential Flush+Reload Attack. 424-439 - Yuntao Wang

, Thomas Wunderer:
Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE. 440-452
Security for Cyber-physical Systems
- Yuichi Komano

, Zhengfan Xia, Takeshi Kawabata, Hideo Shimizu:
Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices. 455-467 - Alban Gabillon

, Emmanuel Bruno
:
Regulating IoT Messages. 468-480 - Jing Xu, Yuqiang Zhang, Fei Xu, Lei Zhou, Shuanglin Jiang:

A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks. 481-492
Security in Mobile Environment
- Entao Luo

, Guojun Wang
, Kun Tang
, Quanyou Zhao, Chen He, Liyong Guo:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. 495-505 - Yi-Ning Liu

, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu:
Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks. 506-518
Secure Computation and Data Privacy
- Karin Sumongkayothin:

M-ORAM Revisited: Security and Construction Updates. 521-532 - Sabyasachi Dutta

, Nishant Nikam, Sushmita Ruj
:
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. 533-543 - Jimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty

:
(k, l)-Clustering for Transactional Data Streams Anonymization. 544-556
Cryptographic Protocols
- Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:

A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. 559-577 - Partha Sarathi Roy

, Sabyasachi Dutta
, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima
, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. 578-594 - Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:

An Efficient and Provably Secure Private Polynomial Evaluation Scheme. 595-609 - Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang

, Yangguang Tian:
Efficient Traceable Oblivious Transfer and Its Applications. 610-621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














