


default search action
26th ICICS 2024: Mytilene, Greece - Part II
- Sokratis K. Katsikas
, Christos Xenakis
, Christos Kalloniatis
, Costas Lambrinoudakis
:
Information and Communications Security - 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15057, Springer 2025, ISBN 978-981-97-8800-2
Crypto and Applied Crypto
- Yuwei Xu, Zhengxin Xu, Jie Cao, Rongrong Wang, Yali Yuan, Guang Cheng:
TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-training. 3-23 - Shengzhe Meng, Chengrui Dang, Bei Liang, Jintai Ding:
Two-Round Post-quantum Private Equality Test and OT from RLWE-Encryption. 24-42 - Iaroslav Gridin
, Antonis Michalas
:
Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing. 43-62 - Yong Li
, Yueyang Feng, Xi Chen
, Jian Zhang, Ruxian Li, Kewei Lv
, Dawei Zhang
:
FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection. 63-83
Homomorphic Encryption
- Adam Caulfield, Nabiha Raza, Peizhao Hu:
X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. 87-106 - Yan Xu, Li-Ping Wang, Huaxiong Wang:
Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions. 107-127 - Hao Huang, Xiaofen Wang, Ke Zhang, Man Ho Au, Sheng Cao, Qinglin Zhao, Xiaosong Zhang:
Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM. 128-148
Key Agreement Protocols and Digital Signature Schemes
- Yijing Peng, Junhui Wang, Zhenyu Wang, Zhenbin Guo, Yaohua Wang, Ding Deng, Shaoqing Li, Yang Guo:
CoDPoC IP: A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme. 151-170 - Navya Sivaraman
, Simin Nadjm-Tehrani
, Thomas Johansson
:
Formal Analysis of Julia Key Agreement Protocol. 171-190 - Yang Yang, Fangguo Zhang:
New Construction of Code-Based Signature Schemes. 191-210 - Pingbin Luo, Xinjian Chen, Willy Susilo, Qiong Huang:
Identity-Based Signature from Lattices Without Trapdoors. 211-230
Defences
- Ali Cherry
, Konstantinos Barmpis
, Siamak F. Shahandashti
:
The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication Through Password Managers. 233-252 - Wenjun Fan
, Zichen Yang, Yuanzhen Liu, Lang Qin, Jia Liu:
HoneyLLM: A Large Language Model-Powered Medium-Interaction Honeypot. 253-272 - Bo Cui, Shuai Liu:
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Based on Time Series Representation Learning. 273-288 - Ke Yang, Shuguang Yuan, Jing Yu, Yuyang Wang, Tengfei Yang, Chi Chen:
Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases. 289-309 - Mingfeng Xin, Hui Wen, Liting Deng, Hong Li, Qiang Li, Limin Sun:
FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting. 310-331

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.