Abstract is missing.
- Security Analysis of SM9 Key Agreement and EncryptionZhaohui Cheng. 3-25 [doi]
- Evaluating CryptoNote-Style BlockchainsRunchao Han, Jiangshan Yu, Joseph K. Liu, Peng Zhang 0029. 29-48 [doi]
- Goshawk: A Novel Efficient, Robust and Flexible Blockchain ProtocolCencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu. 49-69 [doi]
- AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account ModelHaibo Tian, Xiaofeng Chen 0001, Yong Ding, Xiaoyan Zhu, Fangguo Zhang. 70-85 [doi]
- Anonymity Reduction Attacks to MoneroDimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen. 86-100 [doi]
- Analysis of Variance of Graph-Clique Mining for Scalable Proof of WorkHiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai. 101-114 [doi]
- Preprocess-then-NTT Technique and Its Applications to Kyber and NewHopeShuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He. 117-137 [doi]
- Two-Round PAKE Protocol over Lattices Without NIZKZengpeng Li, Ding Wang. 138-159 [doi]
- Improved Integral Attacks on PRESENT-80Shi Wang, Zejun Xiang, Xiangyong Zeng, Shasha Zhang. 163-182 [doi]
- Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128Ruyan Wang, Xiaohan Meng, Yang Li 0022, Jian Wang. 183-199 [doi]
- Improved Indifferentiability Security Bound for the Prefix-Free Merkle-Damgård Hash FunctionKamel Ammour, Lei Wang. 200-219 [doi]
- Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud ComputingDengzhi Liu, Jian Shen 0001, Yuling Chen, Chen Wang 0015, Tianqi Zhou, Anxi Wang. 223-239 [doi]
- Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability ObfuscationMingwu Zhang, Yan Jiang, Hua Shen, Bingbing Li, Willy Susilo. 240-259 [doi]
- An Encrypted Database with Enforced Access Control and Blockchain ValidationZhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian. 260-273 [doi]
- Using Blockchain to Control Access to Cloud DataJiale Guo, Wenzhuo Yang, Kwok-Yan Lam, Xun Yi. 274-288 [doi]
- A Multi-client DSSE Scheme Supporting Range QueriesRandolph Loh, Cong Zuo, Joseph K. Liu, Shifeng Sun. 289-307 [doi]
- Image Authentication for Permissible CroppingHaixia Chen, Shangpeng Wang, Hongyan Zhang, Wei Wu. 308-325 [doi]
- Chord: Thwarting Relay Attacks Among Near Field CommunicationsYafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei, Li Song. 329-348 [doi]
- Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording ApplicationsMark H. Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang. 349-369 [doi]
- Blockchain-Based Privacy Preserving Deep LearningXudong Zhu, Hui Li 0006, Yang Yu. 370-383 [doi]
- SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation FeaturesRuoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su, Dandan Xu. 384-403 [doi]
- A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability DetectionMingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li, Qingjia Huang. 404-423 [doi]
- Fully Secure Decentralized Ciphertext-Policy Attribute-Based Encryption in Standard ModelChuangui Ma, Aijun Ge, Jie Zhang 0040. 427-447 [doi]
- Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality TestYuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang. 448-467 [doi]
- Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Déjà Q FrameworkMriganka Mandal, Ratna Dutta. 468-489 [doi]
- Attribute-Based Encryption with Efficient Keyword Search and User RevocationJingwei Wang, Xinchun Yin, Jianting Ning, Geong Sen Poh. 490-509 [doi]
- Public-Key Encryption with Selective Opening Security from General AssumptionsDali Zhu, Renjun Zhang, Shuang Hu, Gongliang Chen. 510-530 [doi]
- Confused yet Successful: - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNREloi de Chérisey, Sylvain Guilley, Olivier Rioul. 533-553 [doi]
- Searching BN Curves for SM9Guiwen Luo, Xiao Chen. 554-567 [doi]
- Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd IntegersQun-Xiong Zheng, Dongdai Lin, Wen-Feng Qi. 568-585 [doi]
- Towards Malicious Security of Private Coin Honest Verifier Zero Knowledge for NP via Witness EncryptionJingyue Yu. 586-606 [doi]
- Faster Homomorphic Permutation and Optimizing Bootstrapping in Matrix GSW-FHEShuai Li, Bin Hu. 607-617 [doi]
- A Note on the Sidelnikov-Shestakov Attack of Niederreiter SchemeDingyi Pei, Jingang Liu. 621-625 [doi]
- An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd SensingJinhui Liu, Yong Yu, Yannan Li, Yanqi Zhao, Xiaojiang Du. 626-636 [doi]
- Understanding User Behavior in Online Banking SystemYuan Wang, Liming Wang, Zhen Xu, Wei An. 637-646 [doi]
- Privacy-Preserving Remote User Authentication with k-Times UntraceabilityYangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching, Weiwei Liu. 647-657 [doi]
- Early Detection of Remote Access Trojan by Software Network BehaviorMasatsugu Oya, Kazumasa Omote. 658-671 [doi]