default search action
18th AsiaJCIS 2023: Koganei, Japan
- 18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023. IEEE 2023, ISBN 979-8-3503-4163-8
- Kenta Hagiwara, Kazumasa Omote:
VMI System with Smart Contracts for Demand Forecasting. 1-8 - Kun Peng:
Receipt-Freeness By Flexible Usage Of Mix Network. 9-16 - Rui-Zhen Xu, Sheng-Yi Hong, Po-Wen Chi, Ming-Hung Wang:
A Revocation Key-based Approach Towards Efficient Federated Unlearning. 17-24 - Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang, Yi-Hsueh Lu, Wen-Yi Chen, Shih-Pei Kao:
A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership. 25-31 - Joonwoo Myung, Youngmin Ko, Taewoong Kwon, Jun Lee, Kyuil Kim, Jung-suk Song:
Intrusion Detection Systems Based on Machine Learning Using Feature Expansion Methods. 32-38 - Baodong Wen, Yujue Wang, Yong Ding, Hai Liang, Changsong Yang, Decun Luo:
Towards Privacy-Preserving and Practical Vaccine Supply Chain based on Blockchain. 39-46 - Sheng-Yi Hong, Rui-Zhen Xu, Po-Wen Chi, Albert Guan:
Privacy Preserving Provable Data Possession: A FHE-based Hash Approach. 47-52 - Da Eun Hyeon, Junhyung Park, Heung Youl Youm:
A secure firmware and software update model based on blockchains for Internet of Things devices using SBOM. 53-58 - Yuma Nishihira, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi, Hidenobu Watanabe, Tohru Kondo, Reiji Aibara:
Development of the Edge Computing Platform based on Modular Architecture using Intel SGX. 59-65 - Iuon-Chang Lin, Jing-Yuan Huang, Jason Lin:
A Certificate Management Mechanism Using Distributed Ledger. 66-72 - Jheng-Jia Huang, Wei-Hsueh Wang, Yi-Fan Tseng, Guan-Yu Chen, Hao-Hsiang Chang Chien, Wen-Yan Dai, Nai-Wei Lo:
Anonymous and Unlinkable Identity Scheme in Open Data Environment. 73-80 - Che-Yu Wu, Cheng-Chung Kuo, Chu-Sing Yang:
Phishing Detection with Browser Extension Based on Machine Learning. 81-87 - Shota Kawanaka, Yoshikatsu Kashiwabara, Kohei Miyamoto, Masazumi Iida, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads. 88-94 - Atsuki Nagai, Atsuko Miyaji:
Revisited linear approximation formula of ChaCha. 95-101 - Naoki Kawahara, Atsuko Miyaji, Tomoaki Mimoto:
Privacy-Preserving Frequency Estimation Method. 102-108
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.