Abstract is missing.
- Revocable Registered Attribute-Based Keyword Search Supporting FairnessZongmin Wang, Qiang Wang, Fucai Zhou, Jian Xu. 3-23 [doi]
- HiddenStor: A Steganographic Storage System Built on Secret SharingSiyuan Ma, Yuewu Wang, Chunjing Kou, Peng Wang, Haotian Shi, Jiwu Jing. 24-41 [doi]
- TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable AnonymousChenchen wu, Weijing You, Li Xu 0002. 42-62 [doi]
- On the Relationship Between Public Key Primitives via IndifferentiabilityShuang Hu, Bingsheng Zhang, Cong Zhang, Kui Ren. 65-85 [doi]
- Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and ConstructionsHongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie. 86-105 [doi]
- From Signature with Re-randomizable Keys: Generic Construction of PDPKSZiyi Li 0002, Ruida Wang, Xianhui Lu, Yao Cheng, Liming Gao. 106-125 [doi]
- SIMD Optimizations of White-Box Block Cipher Implementations with the Self-equivalence FrameworkLuoqi Chen, Yufeng Tang, Liangju Zhao, Zheng Gong. 129-149 [doi]
- When Is Multi-channel Better Than Single-Channel: A Case Study of Product-Based Multi-channel Fusion AttacksShilong You, Jianfeng Du, Zhu Wang 0005, Aimin Yu. 150-169 [doi]
- Privacy-Preserving Certificate-Less Authenticated Key Exchange with Key Registration PrivacyLi Duan, Yong Li 0021. 173-192 [doi]
- An Improved Signal Leakage Attack Against DXL Key Exchange ProtocolZhiwei Li, Jun Xu, Lei Hu. 193-210 [doi]
- srCPace: Universally Composable PAKE with Subversion-ResilienceJiahao Liu, Yi Wang, Rongmao Chen, Xincheng Tang, Jinshu Su. 211-231 [doi]
- Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERTHaoyang Lu, Rui Zhang, Tong Kong. 235-254 [doi]
- EditPSM: A New Password Strength Meter Based on Password Reuse via Deep LearningYifei Zhang, Zhenduo Hou, Yunkai Zou, Zhen Li, Ding Wang. 255-276 [doi]
- A Binary Code Similarity Detection Method Based on Multi-source Contrastive LearningHongyu Yang, Yunlong Wang, Ze Hu, Xiang Cheng. 277-295 [doi]
- Malware Detection Method Based on Image Sample Reconstruction and Feature EnhancementLixia Xie, Chenyang Wei, Hongyu Yang, Ze Hu, Xiang Cheng. 296-315 [doi]
- Attention-Based Decompilation Through Neural Machine TranslationRuigang Liang, Ying Cao 0006, Peiwei Hu, Kai Chen 0012. 319-339 [doi]
- DBridger: Discovering Vulnerable Data Sharing Paths in Embedded FirmwareLinyu Li, Lei Yu, Qingli Guo, Ruixuan Zhang, Can Yang, Jun Guan, Xiaorui Gong. 340-359 [doi]
- Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart GridJiangang Lu, Yunfan Yang, Qinqin Wu, Benhan Li, MingXin Lu. 363-380 [doi]
- NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain WalletsBirou Gao, Rui Zhang, Yuting Xiao, Huan Zou. 381-402 [doi]
- Clustering Coefficient Estimating of Distributed Graph Data Based on Shuffled Differential PrivacyHongfa Ding, Peiwang Fu, Heling Jiang, Xuesong Li, Linjiang Wu. 403-423 [doi]
- Public-Key Watermarkable PRFs with Dynamic Bounded CollusionSiyuan Yu, Ziqi Zhu, Rupeng Yang, Junqing Gong 0001. 427-443 [doi]
- A Lossless Relational Data Watermarking Scheme Based on Uneven PartitioningWenhao Xu, Hequn Xian. 444-460 [doi]
- CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-Knowledge ProofYuhao Lian, Ying Ouyang, Songsong Li, Deng Tang. 461-481 [doi]