default search action
21st ISC 2018: Guildford, UK
- Liqun Chen, Mark Manulis, Steve A. Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1
Invited Paper
- Cecilia Boschini, Jan Camenisch, Gregory Neven:
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs. 3-22
Software Security
- Stephan Kleber, Florian Unterstein, Matthias Hiller, Frank Slomka, Matthias Matousek, Frank Kargl, Christoph Bösch:
Secure Code Execution: A Generic PUF-Driven System Architecture. 25-46 - Vitor Monte Afonso, Anatoli Kalysch, Tilo Müller, Daniela Oliveira, André Grégio, Paulo Lício de Geus:
Lumus: Dynamically Uncovering Evasive Android Applications. 47-66 - Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Hai-Xin Duan:
ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software. 67-84 - Kemal Bicakci, Enes Altuncu, Muhammet Sakir Sahkulubey, Hakan Ezgi Kiziloz, Yusuf Uzunay:
How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification. 85-98
Symmetric Ciphers and Cryptanalysis
- Yingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu:
Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy. 101-115 - Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin:
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP. 116-131 - Daniël Bodden:
Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails. 132-150 - Xiaojuan Zhang, Meicheng Liu, Dongdai Lin:
Conditional Cube Searching and Applications on Trivium-Variant Ciphers. 151-168
Data Privacy and Anonymization
- Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin:
Practical Attacks on Relational Databases Protected via Searchable Encryption. 171-191 - Staal Amund Vinterbo:
A Simple Algorithm for Estimating Distribution Parameters from n n -Dimensional Randomized Binary Responses. 192-209
Outsourcing and Assisted Computing
- Fangjie Jiang, Quanwei Cai, Le Guan, Jingqiang Lin:
Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection. 213-230 - Yanting Zhang, Jianwei Liu, Zongyang Zhang, Yang Hu:
Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices. 231-249 - Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy:
Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT. 250-267 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. 268-285
Advanced Encryption
- Lucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann:
Function-Dependent Commitments for Verifiable Multi-party Computation. 289-307 - Xin Wang, Bei Liang, Shimin Li, Rui Xue:
On Constructing Pairing-Free Identity-Based Encryptions. 308-327 - Satoshi Yasuda, Yoshihiro Koseki, Ryo Hiromasa, Yutaka Kawai:
Multi-key Homomorphic Proxy Re-Encryption. 328-346 - Fucai Luo, Kunpeng Wang:
Verifiable Decryption for Fully Homomorphic Encryption. 347-365
Privacy-Preserving Applications
- Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au:
Platform-Independent Secure Blockchain-Based Voting System. 369-386 - Abdulwhab Alkharashi, Karen Renaud:
Privacy in Crowdsourcing: A Systematic Review. 387-400
Advanced Signatures
- Veronika Kuchta, Rajeev Anand Sahu, Vishal Saraswat, Gaurav Sharma, Neetu Sharma, Olivier Markowitch:
Anonymous yet Traceable Strong Designated Verifier Signature. 403-421 - Masahito Ishizaka, Kanta Matsuura:
Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions. 422-441 - Keita Emura, Takuya Hayashi:
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation. 442-460
Network Security
- Pierangelo Lombardo, Salvatore Saeli, Federica Bisio, Davide Bernardi, Danilo Massa:
Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic. 463-480 - Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell:
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking. 481-501 - Carolina Adaros Boye, Paul Kearney, Mark B. Josephs:
Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment. 502-519
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.