Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3058060acmotherconferencesBook PagePublication PagesiccspConference Proceedingsconference-collections
ICCSP '17: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICCSP '17: 2017 International Conference on Cryptography, Security and Privacy Wuhan China March 17 - 19, 2017
ISBN:
978-1-4503-4867-6
Published:
17 March 2017
In-Cooperation:
Wuhan Univ.
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 23 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

It is our pleasure to introduce you to the Proceedings of 2017 International Conference on Cryptography, Security and Privacy (ICCSP 2017). Interest in cryptography, security and privacy has remarkably increased in recent years. Novel solutions of cryptography theory and technology, network information security, image information security and encryption, computer system design and security and their applications are the evidence of significant progress.

Skip Table Of Content Section
SESSION: Cryptography Theory and Technology
research-article
On the Construction of the 4 x 4 Lightest Circulant MDS Matrices

4 x 4 MDS (Maximal Distance Separable) matrices with few XORs have a wide range of applications in many mainstream lightweight ciphers. For 4 x 4 circulant MDS matrices over GL(4,F2), they have at least 12 XOR operations. In this paper, by traversing ...

research-article
On Equivalence with Output Sequence of Grain Model

Grain is one of the hardware-oriented finalists of the eSTREAM. A generalized definition of all Grain-like stream ciphers is proposed in this paper, namely Grain Model. We construct equivalent sequences to the outputting and structures to the model, not ...

research-article
Feasibility Analysis of Lattice-based Proxy Re-Encryption

Proxy Re-encryption (PRE) is a useful cryptographic structure who enables a semi-trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the corresponding plaintext. Although there are many PRE schemes in recent years, ...

research-article
On A Class Pseudo-Dynamic Substitutions PD-Sbox, With A Perfect Averaged Distribution of Differentials in Static Mode of Work

Paper present results of the initial analysis of class a pseudo-dynamic substitutions PD-sbox, having a perfect distribution of differentials, when averaged over all possible generated substitutions in static mode of work (in case of work with fixed ...

research-article
Ternary Linear Codes with Few Weights from Functions with Two Variables

How to construct good linear codes is an important problem in coding theory. This paper considers the construction of linear codes from functions with two variables, presents a class of two-weight and three-weight ternary linear codes and employs the ...

SESSION: Image Information Security and Encryption
research-article
Variance Analysis of Pixel-Value Differencing Steganography

As the adaptive steganography selects edge and texture area for loading, the theoretical analysis is limited by modeling difficulty. This paper introduces a novel method to study pixel-value difference (PVD) embedding scheme. First, the difference ...

research-article
A Video Dual Watermarking Algorithm Against Geometric Attack Based on Integer Wavelet and SIFT

In this paper, a video dual watermarking algorithm is presented which is based on integer wavelet and SIFT (scale invariant feature transform). Firstly, the maximum embedding intensity is acquired which is based on the visual threshold of video content ...

research-article
A Privacy-Preserving Method for Photo Sharing in Instant Message Systems

In instant messaging systems, photos have become an expressive form of real-time content sharing among users. Unfortunately, faces of stakeholders, who are depicted in the shared photos, may be exposed to unexpected viewers. This may lead to privacy ...

SESSION: Network Information Security
research-article
Security Communication for AMI on Basis of ECC and ESP

The paper proposed a security communication solution which was suitable for Ethernet network in order to realize the secure transmission of the cipher texts in exchanging information process of the advanced metering infrastructure. Firstly, Ethernet ...

research-article
A Practical Compartmentation Approach for the Android App Coexistence

Android operation system (OS) provides a number of covert and overt communication channels between applications. This significant promotes inter-app collaboration and reduces development time and cost by facilitating component reuse. Unfortunately, ...

research-article
Cross-site Scripting Attacks on Android Hybrid Applications

Hybrid mobile applications are coded in both standard web languages and native language. The including of web technologies results in that Hybrid applications introduce more security risks than the traditional web applications, which have more possible ...

research-article
Covert Channel over Network Time Protocol

In this paper, we scrutinize a way through which covert messages are sent and received using the Network Time Protocol (NTP), which is not easily detected since NTP should be present in most environment to synchronize the clock between clients and ...

research-article
A Matrix Decomposition based Webshell Detection Method

WebShell is a web based network backdoor. With the help of WebShells, the hacker can take any control of the web services illegally. The current method of detecting WebShells is just matching the eigenvalues or detecting the produced flow or services, ...

research-article
Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem

Symmetry ergodic matrices exponentiation (SEME) problem is to find x, given CxMDx, where C and D are the companion matrices of primitive polynomials and M is an invertible matrix over finite field. This paper proposes a new zero-knowledge identification ...

research-article
A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack

Since the first (t, n) threshold proxy signature scheme was proposed, a great deal of work has been done. To avoid dispute, it is necessary to identify the actual signer who generates the proxy signature. To withstand the forgery attack that the ...

research-article
Features of the Photon Pulse Detection Algorithm in the Quantum Key Distribution System

A two-pass fiber-optic quantum key distribution system with phase-encoded photon states in synchronization mode has been investigated. The possibility of applying the analytical expressions for the calculation of the correct detection probability of the ...

SESSION: Computer System Design and Security
research-article
Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems

Packet leak on network-on-chip (NoC) is one of the key security concerns in the MPSoC design, where the NoC of the system can come from a third-party vendor and can be illegitimately implanted with hardware trojans. Those trojans are usually small so ...

research-article
Research on Information Security Framework of Intelligent Connected Vehicle

This paper describes the definition and main technical characteristics of intelligent networked vehicles and reviews the current research situation of information security of intelligent networked vehicles at home and abroad. Furthermore, it summarizes ...

research-article
MGeT: Malware Gene-Based Malware Dynamic Analyses

Malware, as a malicious software, or applications or execution codes, has become the centerpiece of most security threats in such a unceasing open Internet environment. The essential technology of malware analysis is to extract the characteristics of ...

research-article
Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP Protocol

The Modbus/TCP protocol is commonly used in the industrial control systems for communications between the human-machine interface and the industrial controllers. This paper proposes a real-time intrusion detection method based on bidirectional access of ...

research-article
FL-GUARD: A Detection and Defense System for DDoS Attack in SDN

This paper proposed a new detection and prevention system against DDoS (Distributed Denial of Service) attack in SDN (software defined network) architecture, FL-GUARD (Floodlight-based guard system). Based on characteristics of SDN and centralized ...

research-article
Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing Environment

Cloud computing technology has become another revolution of information technology after the Internet due to their advantages of dynamic extensions, on-demand services, and charging by volume. The hybrid cloud, as a kind of the cloud computing, has ...

research-article
A Semi-Formal Multi-Policy Secure Model for Semantic Spatial Trajectories

With the proliferation of locating devices, more and more raw spatial trajectories are formed, and many works enrich these raw trajectories with semantics, and mine patterns from both raw and semantic trajectories, but access control of spatial ...

research-article
Development of Intelligent Digital Certificate Fuzzer Tool

Present day software testing demands effective ways to find software vulnerabilities through testing. This is especially true in case of network security that employ digital certificates for authentication. Digital certificates are the de-facto standard ...

research-article
Logical Language of Certificate-Based Access Control in Security Models

Over the last decades, we have seen several policy models, including role-based access control and more recently, certificate-base control. These models are based on the important notion "flow relation". In this work, we present a logical language of ...

research-article
Online Biometric Authentication Using Subject-Specific Band Power features of EEG

Biometric recognition of persons based on unique features extracted from brain signals is an emerging area of research nowadays, on account of the subject-specificity of human neural activity. This paper proposes an online Electroencephalogram (EEG) ...

research-article
A Defense Method against Docker Escape Attack

As one of the main technologies to support the virtualization of cloud computing, Docker has the characteristics of fast and lightweight virtualization on operating system-level,and is widely used in a variety of cloud platforms. Docker is faced with ...

Index terms have been assigned to the content through auto-classification.

Recommendations