Login / Signup
ISPEC
2005
2011
2017
2023
2005
2023
Keyphrases
Publications
2023
Yuchen Yin
,
Qingqing Gan
,
Cong Zuo
,
Ning Liu
,
Changji Wang
,
Yuning Jiang
A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability.
ISPEC
(2023)
Sergejs Kozlovics
,
Krisjanis Petrucena
,
Davis Larins
,
Juris Viksna
Quantum Key Distribution as a Service and Its Injection into TLS.
ISPEC
(2023)
Kwan Yin Chan
,
Handong Cui
,
Tsz Hon Yuen
DIDO: Data Provenance from Restricted TLS 1.3 Websites.
ISPEC
(2023)
Bijoy Das
,
Abhijit Das
,
Dipanwita Roy Chowdhury
Security Analysis of WAGE Against Division Property Based Cube Attack.
ISPEC
(2023)
Ngo Duc Hoang Son
,
Huynh Thai Thi
,
Phan The Duy
,
Van-Hau Pham
XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph.
ISPEC
(2023)
Guanghui Liu
,
Yuejun Liu
,
Yongbin Zhou
,
Yiwen Gao
Recovering Multi-prime RSA Keys with Erasures and Errors.
ISPEC
(2023)
Maciej Grzeskowiak
,
Lukasz Krzywiecki
,
Karol Niczyj
Cryptanalysis of Human Identification Protocol with Human-Computable Passwords.
ISPEC
(2023)
Philipp Jakubeit
,
Andreas Peter
,
Maarten van Steen
LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity.
ISPEC
(2023)
Yohei Watanabe
,
Naoto Yanai
,
Junji Shikata
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures.
ISPEC
(2023)
Tran Duc Luong
,
Vuong Minh Tien
,
Phan The Duy
,
Van-Hau Pham
FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations.
ISPEC
(2023)
Samaneh Mohammadi
,
Sima Sinaei
,
Ali Balador
,
Francesco Flammini
Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition.
ISPEC
(2023)
Mingming Wang
,
Qianhong Wu
Lever: Making Intensive Validation Practical on Blockchain.
ISPEC
(2023)
Ying Li
,
Yuhao Lin
,
Yongchao Zhong
,
Qiuling Yue
,
Jinglu Hu
,
Wenjie Wang
,
Huiyang Shi
,
Yuqing Zhang
Multimodal Software Defect Severity Prediction Based on Sentiment Probability.
ISPEC
(2023)
Bikash Saha
,
Nanda Rani
,
Sandeep Kumar Shukla
MalXCap: A Method for Malware Capability Extraction.
ISPEC
(2023)
Yuki Nakagawa
,
Mamoru Mimura
XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs.
ISPEC
(2023)
Na Wang
,
Gaofei Wu
,
Jingfeng Rong
,
Zheng Yan
,
Qiuling Yue
,
Jinglu Hu
,
Yuqing Zhang
Cross-Border Data Security from the Perspective of Risk Assessment.
ISPEC
(2023)
Chao Liu
,
Bozhong Liu
A New Gadget Decomposition Algorithm with Less Noise Growth in HE Schemes.
ISPEC
(2023)
Zhen Xia
,
Zhenfu Cao
,
Jiachen Shen
,
Xiaolei Dong
,
Jun Zhou
,
Liming Fang
,
Zhe Liu
,
Chunpeng Ge
,
Chunhua Su
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
ISPEC
(2023)
Tomoya Morooka
,
Yoshifumi Manabe
,
Kazumasa Shinagawa
Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations.
ISPEC
(2023)
Li Liu
,
Puwen Wei
When MPC in the Head Meets VC.
ISPEC
(2023)
Hannes Salin
,
Lukasz Krzywiecki
A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS).
ISPEC
(2023)
Ahmed E. Samy
,
Sarunas Girdzijauskas
Mitigating Sybil Attacks in Federated Learning.
ISPEC
(2023)
Sebastian Simon
,
Cezara Petrui
,
Carlos Pinzón
,
Catuscia Palamidessi
Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy.
ISPEC
(2023)
Jiahui Wang
,
Yulong Fu
,
Mengru Liu
,
Jin Cao
,
Hui Li
,
Zheng Yan
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
ISPEC
(2023)
Mathieu de Goyon
,
Atsuko Miyaji
Isogeny-Based Multi-signature Scheme.
ISPEC
(2023)
Mahdieh Safarzadehvahed
,
Farzaneh Abazari
,
Fateme Shabani
QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing.
ISPEC
(2023)
Yalan Wang
,
Liqun Chen
,
Long Meng
,
Yangguang Tian
BAHS: A Blockchain-Aided Hash-Based Signature Scheme.
ISPEC
(2023)
Thomas Prantl
,
Simon Engel
,
Lukas Horn
,
Dennis Kaiser
,
Lukas Iffländer
,
André Bauer
,
Christian Krupitzer
,
Samuel Kounev
Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example.
ISPEC
(2023)
Sohto Chiku
,
Keisuke Hara
,
Junji Shikata
Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities.
ISPEC
(2023)
Andrés Gómez Ramirez
,
Loui Al Sardy
,
Francis Gomez Ramirez
Tikuna: An Ethereum Blockchain Network Security Monitoring System.
ISPEC
(2023)
Ajay Chandra Korlapati
,
Sanjeet Kumar Nayak
,
Partha Sarathi Chakraborty
,
Somanath Tripathy
SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
ISPEC
(2023)
Rauli Kaksonen
,
Kimmo Halunen
,
Marko Laakso
,
Juha Röning
Transparent Security Method for Automating IoT Security Assessments.
ISPEC
(2023)
P. Mohan Anand
,
P. V. Sai Charan
,
Hrushikesh Chunduri
,
Sandeep K. Shukla
RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files.
ISPEC
(2023)
Jia Zhao
,
Xinyu Rao
,
JiQiang Liu
,
Yue Guo
,
BoKai Yang
CVAR-FL IoV Intrusion Detection Framework.
ISPEC
(2023)
Rabeya Basri
,
Gour C. Karmakar
,
Joarder Kamruzzaman
,
S. H. Shah Newaz
,
Linh V. Nguyen
,
Muhammad Usman
Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G.
ISPEC
(2023)
volume 14341, 2023
Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings
ISPEC
14341 (2023)
2022
Slawomir Matelski
Secure Human Identification Protocol with Human-Computable Passwords.
ISPEC
(2022)
Yen-Kang Fu
,
Jonathan Chang
,
David Jao
Optimal Generic Attack Against Basic Boneh-Boyen Signatures.
ISPEC
(2022)
Subir Halder
,
Thomas Newe
Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT.
ISPEC
(2022)
Martin Georgiev
,
Simon Eberz
,
Ivan Martinovic
Techniques for Continuous Touch-Based Authentication.
ISPEC
(2022)
Jiang-Yi Zeng
,
Chi-Yuan Chen
,
Hsin-Hung Cho
Detection of Adversarial Examples Based on the Neurons Distribution.
ISPEC
(2022)
Maharage Nisansala Sevwandi Perera
,
Toru Nakamura
,
Takashi Matsunaka
,
Hiroyuki Yokoyama
,
Kouichi Sakurai
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities.
ISPEC
(2022)
Yu-Chen Liao
,
Raylin Tso
,
Zi-Yuan Liu
,
Yi-Fan Tseng
Blockchain-Based Confidential Payment System with Controllable Regulation.
ISPEC
(2022)
Ha Xuan Son
,
Barbara Carminati
,
Elena Ferrari
PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation.
ISPEC
(2022)
Bodi Bodi
,
Wei-Yang Chiu
,
Weizhi Meng
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System.
ISPEC
(2022)
Orhan Ermis
,
Christophe Feltus
,
Qiang Tang
,
Hoang Trang
,
Alexandre De Oliveira
,
Cu D. Nguyen
,
Alain Hirtzig
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks.
ISPEC
(2022)
Yuxiao Luo
,
Jianwei Tai
,
Xiaoqi Jia
,
Shengzhi Zhang
Practical Backdoor Attack Against Speaker Recognition System.
ISPEC
(2022)
Yuki Mezawa
,
Mamoru Mimura
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection.
ISPEC
(2022)
Zheng Yao Ng
,
Iftekhar Salam
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data.
ISPEC
(2022)
volume 13620, 2022
Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings
ISPEC
13620 (2022)