


default search action
25th ICICS 2023: Tianjin, China
- Ding Wang
, Moti Yung
, Zheli Liu
, Xiaofeng Chen
:
Information and Communications Security - 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14252, Springer 2023, ISBN 978-981-99-7355-2
Symmetric-Key Cryptography
- Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi:
SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA. 3-18 - Xuanyu Liang, Yincen Chen, Ling Song, Qianqian Yang, Zhuohui Feng, Tianrong Huang:
Improved Related-Key Rectangle Attack Against the Full AES-192. 19-34 - Sijia Liu, Min Luo, Cong Peng, Debiao He:
Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM. 35-50 - Jiqiang Lu, Can Wang:
Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher. 51-68 - Arghya Bhattacharjee
, Ritam Bhaumik, Avijit Dutta, Eik List:
PAE: Towards More Efficient and BBB-Secure AE from a Single Public Permutation. 69-87
Public-Key Cryptography
- Guoqing Zhou, Maozhi Xu:
A Polynomial-Time Attack on G2SIDH. 91-109 - Hongyuan Qu
, Guangwu Xu
:
Improvements of Homomorphic Secure Evaluation of Inverse Square Root. 110-127 - Shuaishuai Li, Cong Zhang
, Dongdai Lin:
Oblivious Transfer from Rerandomizable PKE. 128-145 - Xiaoling Yu, Yuntao Wang:
Forward Secure Lattice-Based Ring Signature Scheme in the Standard Model. 146-158
Applied Cryptography
- Takeshi Nakai, Kazumasa Shinagawa:
Secure Multi-party Computation with Legally-Enforceable Fairness. 161-178 - Xiaogang Cao, Fenghua Li, Kui Geng, Yingke Xie, Wenlong Kou:
On-Demand Allocation of Cryptographic Computing Resource with Load Prediction. 179-196 - Iraklis Leontiadis, Serge Vaudenay:
Private Message Franking with After Opening Privacy. 197-214 - Huan Zou, Yuting Xiao, Rui Zhang:
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction. 215-234 - Amirreza Hamidi, Hossein Ghodosi:
Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography. 235-246
Authentication and Authorization
- Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe:
PiXi: Password Inspiration by Exploring Information. 249-266 - Ningjing Fan
, Dongdong Zhao, Hucheng Liao:
Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification. 267-283 - Minqiu Tian, Fenghua Li, Kui Geng, Wenlong Kou, Chao Guo:
A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things. 284-301 - Yuting Zuo
, Li Xu
, Yuexin Zhang, Zhaozhe Kang, Chenbin Zhao:
BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social Networks. 302-313
Privacy and Anonymity
- Futai Zou, Yuelin Hu, Wenliang Xu, Yue Wu:
Link Prediction-Based Multi-Identity Recognition of Darknet Vendors. 317-332 - Jianli Bai, Xiaowu Zhang, Xiangfu Song, Hang Shao, Qifan Wang, Shujie Cui, Giovanni Russello:
CryptoMask: Privacy-Preserving Face Recognition. 333-350 - Cong Zhang
, Weiran Liu, Bolin Ding, Dongdai Lin:
Efficient Private Multiset ID Protocols. 351-369 - Yuwei Xu, Lei Wang, Jiangfeng Li, Kehui Song, Yali Yuan:
Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services. 370-382 - Jiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan, Xiaofei Wu, Lu Zhou, Liming Fang
:
An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV. 383-395
Security and Privacy of AI
- Soohyeon Choi
, Manar Mohaisen
, Daehun Nyang
, David Mohaisen
:
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors. 399-417 - Huangxinyue Wu, Haoran Li, Jinhong Zhang, Wei Zhou, Lei Guo, Yunyun Dong:
Multi-scale Features Destructive Universal Adversarial Perturbations. 418-434 - Hong Huang, Xingyang Li, Wenjian He:
Pixel-Wise Reconstruction of Private Data in Split Federated Learning. 435-450 - Xubo Yang
, Linsen Li
, Yenan Chen
:
Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments. 451-466 - Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao:
Black-Box Fairness Testing with Shadow Models. 467-484 - Wenyue Zheng, Ximeng Liu, Yuyang Wang, Xuanwei Lin:
Graph Unlearning Using Knowledge Distillation. 485-501 - Renyang Liu
, Jinhong Zhang
, Haoran Li
, Jin Zhang
, Yuanyu Wang
, Wei Zhou
:
AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings. 502-518 - Lichao Su, Bin Wu, Chenwei Dai, Huan Luo, Jian Chen:
Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference. 519-533 - Hewei Yu, Pengfei Shi:
A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation. 534-549
Blockchain and Cryptocurrencies
- Yuwei Xu, Haoyu Wang, Junyu Zeng:
SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains. 553-570 - Yifu Geng, Bo Qin, Qin Wang
, Wenchang Shi, Qianhong Wu:
Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy. 571-589 - Yuhan Song
, Yuefei Zhu
, Fushan Wei
:
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions. 590-607 - Shan Jin
, Yong Li
, Xi Chen
, Ruxian Li:
Blockchain Based Publicly Auditable Multi-party Computation with Cheater Detection. 608-626 - Johan Hagelskjar Sjursen, Weizhi Meng
, Wei-Yang Chiu
:
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. 627-644 - Erya Jiang, Bo Qin, Qin Wang
, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi, Wenyi Tang:
BDTS: Blockchain-Based Data Trading System. 645-664 - Chang Xu, Shiyao Zhang, Liehuang Zhu, Xiaodong Shen, Xiaoming Zhang:
Illegal Accounts Detection on Ethereum Using Heterogeneous Graph Transformer Networks. 665-680
System and Network security
- Loganathan Parthipan
, Liqun Chen
, Christopher J. P. Newton
, Yunpeng Li
, Fei Liu, Donghui Wang:
DRoT: A Decentralised Root of Trust for Trusted Networks. 683-701 - Yeqi Fu, Yongzhi Liu, Qian Zhang, Zhou Yang, Xiarun Chen, Chenglin Xie, Weiping Wen:
Finding Missing Security Operation Bugs via Program Slicing and Differential Check. 702-718 - Kassem Bagher
, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi:
TimeClave: Oblivious In-Enclave Time Series Processing System. 719-737 - Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang:
Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios. 738-749 - Hongyu Yang, Jinjiao Zhang, Ze Hu, Liang Zhang, Xiang Cheng:
A Fake News Detection Method Based on a Multimodal Cooperative Attention Network. 750-760

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.