


default search action
iSPEC 2021: Nanjing, China
- Robert H. Deng

, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang:
Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings. Lecture Notes in Computer Science 13107, Springer 2021, ISBN 978-3-030-93206-0 - Kaiwei Zhang, Ailun Ma, Shanxiang Lyu

, Jiabo Wang, Shuting Lou:
Efficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes Again. 1-10 - Ruturaj K. Vaidya, Prasad A. Kulkarni, Michael R. Jantz

:
Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs. 11-31 - Zongqi Chen

, Hongwei Li, Meng Hao, Guowen Xu
:
Enhanced Mixup Training: a Defense Method Against Membership Inference Attack. 32-45 - Zhi Hu, Lin Wang, Zijian Zhou:

Isogeny Computation on Twisted Jacobi Intersections. 46-56 - Guangxia Xu

, Yuqing Xu
:
EPFSTO-ARIMA: Electric Power Forced Stochastic Optimization Predicting Based on ARIMA. 57-68 - Yunxiao Yang, Xuan Shen, Bing Sun:

Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix. 69-89 - Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji

:
Message-Restriction-Free Commitment Scheme Based on Lattice Assumption. 90-105 - Shanshan Li, Chunxiang Xu:

PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud Storage. 106-125 - Yanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal

:
OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control. 126-146 - Yingjie Zhang, Lijun Lyu, Kexin Qiao

, Zhiyu Zhang, Siwei Sun, Lei Hu:
Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK. 147-167 - Mriganka Mandal

, Ramprasad Sarkar, Junbeom Hur, Koji Nuida
:
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security. 168-189 - Shao-Jun Yang, Xinyi Huang, Mingmei Zheng, Jinhua Ma:

Ring Trapdoor Redactable Signatures from Lattice. 190-208 - Beiyuan Yu

, Jianwei Liu
, Ziyu Zhou:
WADS: A Webshell Attack Defender Assisted by Software-Defined Networks. 209-222 - Xiulan Li, Yanbin Pan, Chengliang Tian:

Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem. 223-241 - Weican Huang, Ning Ding:

Privacy-Preserving Support Vector Machines with Flexible Deployment and Error Correction. 242-262 - Johann Großschädl, Christian Franck, Zhe Liu:

Lightweight EdDSA Signature Verification for the Ultra-Low-Power Internet of Things. 263-282 - Dongdong Yang

, Baopeng Ye, Yuling Chen, Huiyu Zhou, Xiaobin Qian:
A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance. 283-295 - Chaohui Fu, Ming Duan, Xunhai Dai, Qiang Wei, Qianqiong Wu, Rui Zhou:

DenseGAN: A Password Guessing Model Based on DenseNet and PassGAN. 296-305 - Tao Ye, Yongzhuang Wei, Lingcheng Li, Enes Pasalic:

Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation. 306-326 - Joseph K. Liu, Man Ho Au, Tsz Hon Yuen

, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. 327-344 - Xinjian Chen, Qiong Huang, Jianye Huang:

A Novel Certificateless Multi-signature Scheme over NTRU Lattices. 345-362 - Junfeng Wu

, Jinwei Wang, Junjie Zhao, Xiangyang Luo:
StrGAN for Generating Enhanced Samples. 363-373 - Huijie Yang, Tianqi Zhou, Chen Wang, Debiao He:

A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework. 374-391 - Baoyu Zhai, Xing Li, Qi Yang, Wanru Li, Ruizhe Sun, Bingtuan Gao:

Penetration rate-equivalent inertia time constant function identification method of renewable energy power system. 1-6 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














