


default search action
25th ISC 2022: Bali, Indonesia
- Willy Susilo
, Xiaofeng Chen
, Fuchun Guo
, Yudi Zhang
, Rolly Intan:
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings. Lecture Notes in Computer Science 13640, Springer 2022, ISBN 978-3-031-22389-1
Cryptography
- Yongge Wang
, Qutaibah M. Malluhi
:
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs. 3-19 - Hanyu Li, Ying Gao:
Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting. 20-39 - Mark Yampolskiy
, Lynne Graves
, Jacob Gatlin
, Jeffrey Todd McDonald
, Moti Yung
:
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files. 40-52 - Yuzhu Wang, Mingwu Zhang
:
Witness Encryption from Smooth Projective Hashing System. 53-72
Post-quantum Cryptography
- Kyoichi Asano
, Keita Emura
, Atsushi Takayasu
:
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model. 75-83 - Manohar Raavi
, Simeon Wuthier
, Pranav Chandramouli
, Xiaobo Zhou
, Sang-Yoon Chang
:
QUIC Protocol with Post-quantum Authentication. 84-91 - Yuting Jiang
, Jianghong Wei
:
Batched Fully Homomorphic Encryption from TFHE. 92-109 - Zhao Chen, Xianhui Lu, Dingding Jia
, Bao Li:
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization. 110-130
Cryptanalysis
- Gongyu Shi
, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. 133-152 - Yingying Li, Qichun Wang
:
The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64. 153-161 - Xiuxiu Li
, Wei Yu
, Kunpeng Wang:
Efficient Scalar Multiplication on Koblitz Curves with Pre-computation. 162-172
Blockchain
- Binbin Tu, Min Zhang
, Chen Yu:
Efficient ECDSA-Based Adaptor Signature for Batched Atomic Swaps. 175-193 - Jianzhang Chen, Haibo Tian, Fangguo Zhang
:
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization. 194-213 - Yongqing Xu
, Kaiyi Zhang
, Yu Yu
:
GRUZ: Practical Resource Fair Exchange Without Blockchain. 214-228 - Arash Mirzaei, Amin Sakzad
, Jiangshan Yu
, Ron Steinfeld
:
Daric: A Storage Efficient Payment Channel with Punishment Mechanism. 229-249 - Biwen Chen
, Bo Tang, Shangwei Guo
, Jiyun Yang
, Tao Xiang
:
A Blockchain-Based Mutual Authentication Protocol for Smart Home. 250-265
Email and Web Security
- Yanjun Shen, Bin Yu, Shangqi Lai
, Xingliang Yuan
, Shifeng Sun
, Joseph K. Liu
, Surya Nepal
:
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. 269-289 - Almuthanna Alageel, Sergio Maffeis
:
EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries. 290-316
Malware
- Yan Lin Aung
, Martín Ochoa
, Jianying Zhou
:
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence. 319-338 - Marcus Botacin
, André Grégio
:
Dissecting Applications Uninstallers and Removers: Are They Effective? 339-359 - Alexander Küchler
, Christian Banse
:
Representing LLVM-IR in a Code Property Graph. 360-380 - Marcus Botacin
, André Grégio
:
Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security. 381-389 - Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye:
Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay. 390-407
AI Security
- Shaofeng Wang, Bo Lang
, Nan Xiao
, Yikai Chen:
AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition. 411-421 - Longlong Sun, Hui Li
, Shiwen Yu, Xindi Ma
, Yanguo Peng
, Jiangtao Cui
:
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud. 422-442 - Lijun Lyu
, Yi Tu
, Yingjie Zhang
:
Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64. 443-463 - Qian Chen
, Zilong Wang
, Yilin Zhou, Jiawei Chen, Dan Xiao, Xiaodong Lin
:
CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks. 464-472 - Shijin Chen, Mingwu Zhang
, Bo Yang
:
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing. 473-490 - Di Xiao
, Xue Tan, Min Li
:
Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing. 491-508

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.