Abstract is missing.
- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification OverheadQitian Sheng, Jiaojiao Wu, Jianfeng Wang. 3-16 [doi]
- A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart HealthcareYuqian Ma, Yongliu Ma, Yidan Liu, Qingfeng Cheng. 17-31 [doi]
- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q)Yong Wang, Hao Xie, Ruyi Wang. 32-47 [doi]
- A Collaborative Access Control Scheme Based on Incentive MechanismsYifei Li, Yinghui Zhang 0002, Wei Liu, Jianting Ning, Dong Zheng 0001. 48-55 [doi]
- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRingZijian Bao, Debiao He, Yulin Liu, Cong Peng, Qi Feng, Min Luo 0002. 56-70 [doi]
- Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud StorageZhenhua Liu 0001, Yuanju Ma, Yaxin Niu, Jingwan Gong, Baocang Wang. 71-85 [doi]
- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed LedgersYao Liu, Zhonghao Yuan, Yunhan Hu. 89-108 [doi]
- A Method of Traceless File Deletion for NTFS File SystemShujiang Xu, Fansheng Wang, Lianhai Wang, Xu Chang, Tongfeng Yang, Weijun Yang. 109-117 [doi]
- Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets SettingLifei Wei, Jihai Liu, Lei Zhang, Wuji Zhang. 118-132 [doi]
- Multi-user Verifiable Database with Efficient Keyword SearchMeixia Miao, Panru Wu, Yunling Wang. 133-146 [doi]
- A Blockchain-Based Collaborative Auditing Scheme for Cloud StorageJie Xiao, Hui Huang 0010, Chenhuang Wu, Qunshan Chen, Zhenjie Huang. 147-159 [doi]
- High Quality Audio Adversarial Examples Without Using PsychoacousticsWei Zong, Yang-Wai Chow, Willy Susilo. 163-177 [doi]
- Working Mechanism of Eternalblue and Its Application in RansomwormZian Liu, Chao Chen, Leo Yu Zhang, Shang Gao 0003. 178-191 [doi]
- Substitution Attacks Against Sigma ProtocolsYuliang Lin, Rongmao Chen, Yi Wang, Baosheng Wang, Lin Liu. 192-208 [doi]
- A Multi-stage APT Attack Detection Method Based on Sample EnhancementLixia Xie, Xueou Li, Hongyu Yang, Liang Zhang. 209-216 [doi]
- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph TransformerHongyu Yang, Haiyun Yang, Liang Zhang. 217-224 [doi]
- Anomalous Network Traffic Detection Based on CK Sketch and Machine LearningYaping Chi, Defan Xue, Ziyan Yue, Zhiqiang Wang 0006, Liang Jiaming. 225-243 [doi]
- FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense SchemeMengfan Xu, Xinghua Li. 244-258 [doi]
- Membership Inference Attacks Against Robust Graph Neural NetworkZhengyang Liu, Xiaoyu Zhang, Chenyang Chen, Shen Lin, Jingjin Li. 259-273 [doi]
- A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on LatticeHaibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li. 277-292 [doi]
- A Defect Level Assessment Method Based on Weighted Probability EnsembleLixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang 0018. 293-300 [doi]
- A Decentralized Ride-Hailing Mode Based on Blockchain and Attribute EncryptionYifan Zhang, Yuping Zhou, Yu Hu, Hui Huang 0010. 301-313 [doi]
- Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on LatticeRuozhou Zuo, Haibo Tian, Zhiyuan An, Fangguo Zhang. 314-326 [doi]
- Improvised Model for Blockchain in Distributed Cloud EnvironmentMeeraj Mahendra Gawde, Gaurav Choudhary, Shishir Kumar Shandilya, Rizwan Ur Rahman, Hoonyong Park, Ilsun You. 327-341 [doi]
- Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS ModelHui Li, Xuelian Li, Juntao Gao, Runsong Wang. 342-357 [doi]
- Design of Anti Machine Learning Malicious Node System Based on BlockchainYuanzhen Liu, Yanbo Yang, Jiawei Zhang, Baoshan Li. 358-373 [doi]