


default search action
14th ISPEC 2018: Tokyo, Japan
- Chunhua Su, Hiroaki Kikuchi:
Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings. Lecture Notes in Computer Science 11125, Springer 2018, ISBN 978-3-319-99806-0
System Security
- Hiroya Miura, Mamoru Mimura
, Hidema Tanaka:
Macros Finder: Do You Remember LOVELETTER? 3-18 - Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser
:
Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection. 19-36 - Venkata Udaya Sameer, Ruchira Naskar
:
Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification. 37-49 - Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen
:
Compact Ring Signature in the Standard Model for Blockchain. 50-65
Public Key Cryptography
- Tatsuya Suzuki, Keita Emura
, Toshihiro Ohigashi
:
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE. 69-86 - Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen:
An Almost Non-interactive Order Preserving Encryption Scheme. 87-100 - Fucai Luo, Kunpeng Wang, Changlu Lin:
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. 101-115
Searchable and Functional Encryption
- Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu:
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits. 119-140 - Pratish Datta:
Constrained (Verifiable) Pseudorandom Function from Functional Encryption. 141-159 - Takato Hirano, Yutaka Kawai, Yoshihiro Koseki:
Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption. 160-175
(Post-quantum) Signature Schemes
- Zhaohui Cheng, Liqun Chen
:
Certificateless Public Key Signature Schemes from Standard Algorithms. 179-197 - Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang:
A New Design of Online/Offline Signatures Based on Lattice. 198-212 - Lucas Schabhüser, Denis Butin
, Johannes Buchmann:
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case. 213-228 - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
:
Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation. 229-247 - Bagus Santoso
, Taiyo Yamaguchi, Tomoyuki Ohkubo:
Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures. 248-262
Security Protocols
- Sergiu Carpov
, Oana Stan
:
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes. 265-281 - Binanda Sengupta
, Sushmita Ruj
:
Keyword-Based Delegable Proofs of Storage. 282-298 - Jia-Ch'ng Loh
, Swee-Huay Heng, Syh-Yuan Tan:
A Generic Framework for Accountable Optimistic Fair Exchange Protocol. 299-309
Network Security
- Wenjuan Li
, Weizhi Meng
, Yu Wang, Jinguang Han
, Jin Li:
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. 313-328 - Wei Zong
, Yang-Wai Chow
, Willy Susilo
:
A Two-Stage Classifier Approach for Network Intrusion Detection. 329-340 - Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li
, Guomin Yang
, Yong Yu
:
DSH: Deniable Secret Handshake Framework. 341-353
Authentication
- Shoichi Hirose
, Junji Shikata:
Non-adaptive Group-Testing Aggregate MAC Scheme. 357-372 - Weizhi Meng
, Zhe Liu:
TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones. 373-390 - Wayne Chiu
, Kuo-Hui Yeh
, Akihito Nakamura:
Seeing Is Believing: Authenticating Users with What They See and Remember. 391-403
Side-Channel Attacks
- Bo-Yeon Sim, Kyu Young Choi
, Dukjae Moon, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han:
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks. 407-423 - Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara
, Jian Wang:
Recovering Memory Access Sequence with Differential Flush+Reload Attack. 424-439 - Yuntao Wang
, Thomas Wunderer:
Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE. 440-452
Security for Cyber-physical Systems
- Yuichi Komano
, Zhengfan Xia, Takeshi Kawabata, Hideo Shimizu:
Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices. 455-467 - Alban Gabillon
, Emmanuel Bruno
:
Regulating IoT Messages. 468-480 - Jing Xu, Yuqiang Zhang, Fei Xu, Lei Zhou, Shuanglin Jiang:
A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks. 481-492
Security in Mobile Environment
- Entao Luo
, Guojun Wang
, Kun Tang
, Quanyou Zhao, Chen He, Liyong Guo:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. 495-505 - Yi-Ning Liu
, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu:
Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks. 506-518
Secure Computation and Data Privacy
- Karin Sumongkayothin:
M-ORAM Revisited: Security and Construction Updates. 521-532 - Sabyasachi Dutta
, Nishant Nikam, Sushmita Ruj
:
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. 533-543 - Jimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty
:
(k, l)-Clustering for Transactional Data Streams Anonymization. 544-556
Cryptographic Protocols
- Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. 559-577 - Partha Sarathi Roy
, Sabyasachi Dutta
, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima
, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. 578-594 - Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:
An Efficient and Provably Secure Private Polynomial Evaluation Scheme. 595-609 - Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang
, Yangguang Tian:
Efficient Traceable Oblivious Transfer and Its Applications. 610-621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.