It is our pleasure to introduce you to the Proceedings of 2017 International Conference on Cryptography, Security and Privacy (ICCSP 2017). Interest in cryptography, security and privacy has remarkably increased in recent years. Novel solutions of cryptography theory and technology, network information security, image information security and encryption, computer system design and security and their applications are the evidence of significant progress.
Proceeding Downloads
On the Construction of the 4 x 4 Lightest Circulant MDS Matrices
4 x 4 MDS (Maximal Distance Separable) matrices with few XORs have a wide range of applications in many mainstream lightweight ciphers. For 4 x 4 circulant MDS matrices over GL(4,F2), they have at least 12 XOR operations. In this paper, by traversing ...
On Equivalence with Output Sequence of Grain Model
Grain is one of the hardware-oriented finalists of the eSTREAM. A generalized definition of all Grain-like stream ciphers is proposed in this paper, namely Grain Model. We construct equivalent sequences to the outputting and structures to the model, not ...
Feasibility Analysis of Lattice-based Proxy Re-Encryption
Proxy Re-encryption (PRE) is a useful cryptographic structure who enables a semi-trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the corresponding plaintext. Although there are many PRE schemes in recent years, ...
On A Class Pseudo-Dynamic Substitutions PD-Sbox, With A Perfect Averaged Distribution of Differentials in Static Mode of Work
Paper present results of the initial analysis of class a pseudo-dynamic substitutions PD-sbox, having a perfect distribution of differentials, when averaged over all possible generated substitutions in static mode of work (in case of work with fixed ...
Ternary Linear Codes with Few Weights from Functions with Two Variables
How to construct good linear codes is an important problem in coding theory. This paper considers the construction of linear codes from functions with two variables, presents a class of two-weight and three-weight ternary linear codes and employs the ...
Variance Analysis of Pixel-Value Differencing Steganography
As the adaptive steganography selects edge and texture area for loading, the theoretical analysis is limited by modeling difficulty. This paper introduces a novel method to study pixel-value difference (PVD) embedding scheme. First, the difference ...
A Video Dual Watermarking Algorithm Against Geometric Attack Based on Integer Wavelet and SIFT
In this paper, a video dual watermarking algorithm is presented which is based on integer wavelet and SIFT (scale invariant feature transform). Firstly, the maximum embedding intensity is acquired which is based on the visual threshold of video content ...
A Privacy-Preserving Method for Photo Sharing in Instant Message Systems
In instant messaging systems, photos have become an expressive form of real-time content sharing among users. Unfortunately, faces of stakeholders, who are depicted in the shared photos, may be exposed to unexpected viewers. This may lead to privacy ...
Security Communication for AMI on Basis of ECC and ESP
The paper proposed a security communication solution which was suitable for Ethernet network in order to realize the secure transmission of the cipher texts in exchanging information process of the advanced metering infrastructure. Firstly, Ethernet ...
A Practical Compartmentation Approach for the Android App Coexistence
Android operation system (OS) provides a number of covert and overt communication channels between applications. This significant promotes inter-app collaboration and reduces development time and cost by facilitating component reuse. Unfortunately, ...
Cross-site Scripting Attacks on Android Hybrid Applications
Hybrid mobile applications are coded in both standard web languages and native language. The including of web technologies results in that Hybrid applications introduce more security risks than the traditional web applications, which have more possible ...
Covert Channel over Network Time Protocol
In this paper, we scrutinize a way through which covert messages are sent and received using the Network Time Protocol (NTP), which is not easily detected since NTP should be present in most environment to synchronize the clock between clients and ...
A Matrix Decomposition based Webshell Detection Method
WebShell is a web based network backdoor. With the help of WebShells, the hacker can take any control of the web services illegally. The current method of detecting WebShells is just matching the eigenvalues or detecting the produced flow or services, ...
Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem
Symmetry ergodic matrices exponentiation (SEME) problem is to find x, given CxMDx, where C and D are the companion matrices of primitive polynomials and M is an invertible matrix over finite field. This paper proposes a new zero-knowledge identification ...
A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack
Since the first (t, n) threshold proxy signature scheme was proposed, a great deal of work has been done. To avoid dispute, it is necessary to identify the actual signer who generates the proxy signature. To withstand the forgery attack that the ...
Features of the Photon Pulse Detection Algorithm in the Quantum Key Distribution System
A two-pass fiber-optic quantum key distribution system with phase-encoded photon states in synchronization mode has been investigated. The possibility of applying the analytical expressions for the calculation of the correct detection probability of the ...
Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems
Packet leak on network-on-chip (NoC) is one of the key security concerns in the MPSoC design, where the NoC of the system can come from a third-party vendor and can be illegitimately implanted with hardware trojans. Those trojans are usually small so ...
Research on Information Security Framework of Intelligent Connected Vehicle
This paper describes the definition and main technical characteristics of intelligent networked vehicles and reviews the current research situation of information security of intelligent networked vehicles at home and abroad. Furthermore, it summarizes ...
MGeT: Malware Gene-Based Malware Dynamic Analyses
Malware, as a malicious software, or applications or execution codes, has become the centerpiece of most security threats in such a unceasing open Internet environment. The essential technology of malware analysis is to extract the characteristics of ...
Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP Protocol
The Modbus/TCP protocol is commonly used in the industrial control systems for communications between the human-machine interface and the industrial controllers. This paper proposes a real-time intrusion detection method based on bidirectional access of ...
FL-GUARD: A Detection and Defense System for DDoS Attack in SDN
This paper proposed a new detection and prevention system against DDoS (Distributed Denial of Service) attack in SDN (software defined network) architecture, FL-GUARD (Floodlight-based guard system). Based on characteristics of SDN and centralized ...
Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing Environment
Cloud computing technology has become another revolution of information technology after the Internet due to their advantages of dynamic extensions, on-demand services, and charging by volume. The hybrid cloud, as a kind of the cloud computing, has ...
A Semi-Formal Multi-Policy Secure Model for Semantic Spatial Trajectories
With the proliferation of locating devices, more and more raw spatial trajectories are formed, and many works enrich these raw trajectories with semantics, and mine patterns from both raw and semantic trajectories, but access control of spatial ...
Development of Intelligent Digital Certificate Fuzzer Tool
Present day software testing demands effective ways to find software vulnerabilities through testing. This is especially true in case of network security that employ digital certificates for authentication. Digital certificates are the de-facto standard ...
Logical Language of Certificate-Based Access Control in Security Models
Over the last decades, we have seen several policy models, including role-based access control and more recently, certificate-base control. These models are based on the important notion "flow relation". In this work, we present a logical language of ...
Online Biometric Authentication Using Subject-Specific Band Power features of EEG
Biometric recognition of persons based on unique features extracted from brain signals is an emerging area of research nowadays, on account of the subject-specificity of human neural activity. This paper proposes an online Electroencephalogram (EEG) ...
A Defense Method against Docker Escape Attack
As one of the main technologies to support the virtualization of cloud computing, Docker has the characteristics of fast and lightweight virtualization on operating system-level,and is widely used in a variety of cloud platforms. Docker is faced with ...
Index Terms
- Proceedings of the 2017 International Conference on Cryptography, Security and Privacy