Abstract is missing.
- Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials SystemWeijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng. 3-16 [doi]
- An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness TestJiahui Shen, Tianyu Chen, Lei Wang, Yuan Ma. 17-35 [doi]
- FABSS: Attribute-Based Sanitizable Signature for Flexible Access StructureRuo Mo, Jianfeng Ma, Ximeng Liu, Qi Li. 39-50 [doi]
- SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OSHuorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li. 51-62 [doi]
- The Reductions for the Approximating Covering Radius ProblemWenwen Wang, Kewei Lv. 65-74 [doi]
- Solving Discrete Logarithm Problem in an Interval Using Periodic IteratesJianing Liu, Kewei Lv. 75-80 [doi]
- Distributed Pseudorandom Functions for General Access Structures in NPBei Liang, Aikaterini Mitrokotsa. 81-87 [doi]
- Reducing Randomness Complexity of Mask Refreshing AlgorithmShuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang 0001. 88-101 [doi]
- A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-SensitivityChangting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng. 105-117 [doi]
- Two Efficient Tag-Based Encryption Schemes on LatticesXueqing Wang, Biao Wang, Rui Xue. 118-131 [doi]
- Compact (Targeted Homomorphic) Inner Product Encryption from LWEJie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang. 132-140 [doi]
- Compact Inner Product Encryption from LWEZhedong Wang, Xiong Fan, Mingsheng Wang. 141-153 [doi]
- Towards Tightly Secure Deterministic Public Key EncryptionDaode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia. 154-161 [doi]
- Efficient Inner Product Encryption with Simulation-Based SecurityQingsong Zhao, Qingkai Zeng, Ximeng Liu. 162-171 [doi]
- Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable DelegationGang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng. 172-179 [doi]
- Practical Large Universe Attribute-Set Based Encryption in the Standard ModelXinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu. 180-191 [doi]
- Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryptionXinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen. 192-204 [doi]
- Identity-Based Group Encryption RevisitedKanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe. 205-209 [doi]
- Compact Hierarchical IBE from Lattices in the Standard ModelDaode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang. 210-221 [doi]
- Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA AttacksIevgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer. 225-235 [doi]
- New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard ModelWenjie Yang, Jian Weng, Futai Zhang. 236-247 [doi]
- A Lattice Attack on Homomorphic NTRU with Non-invertible Public KeysSoyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie. 248-254 [doi]
- Practical Range Proof for Cryptocurrency Monero with Provable SecurityKang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu. 255-262 [doi]
- Modeling Key Infection in Large-Scale Sensor NetworksFeiyang Peng, Zhihong Liu, Yong Zeng, Jialei Wang. 265-275 [doi]
- SDN-Based Secure Localization in Heterogeneous WSNMeigen Huang, Bin Yu 0003. 276-287 [doi]
- A PUF and Software Collaborative Key Protection SchemeChangting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng. 291-303 [doi]
- Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard ExtensionsXueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang. 304-310 [doi]
- Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation OptimizationMingyue Liang, Zhoujun Li, Qiang Zeng 0001, Zhejun Fang. 313-324 [doi]
- A Self-healing Key Distribution Scheme for Mobile Ad Hoc NetworksGuangli Xiang, Lu Yu, Beilei Li, Mengsen Xia. 325-335 [doi]
- SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based EncryptionYu Li, Yazhe Wang, Yuan Zhang. 339-351 [doi]
- Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID SystemDali Zhu, Wenjing Rong, Di Wu, Na Pang. 352-362 [doi]
- Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web InterfacesMing Yuan, Ye Li, Zhoujun Li. 363-373 [doi]
- A Method to Effectively Detect Vulnerabilities on Path Planning of VINJingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han. 374-384 [doi]
- Towards Decentralized Accountability and Self-sovereignty in Healthcare SystemsXueping Liang, Sachin Shetty, Juan Zhao, Daniel Bowden, Danyi Li, Jihong Liu. 387-398 [doi]
- P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare SystemChangji Wang, Yuan Yuan, Shengyi Jiang. 399-411 [doi]
- S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 ProtocolFeng Xiao, Enhong Chen, Qiang Xu. 412-423 [doi]
- Research on Clustering-Differential Privacy for Express Data ReleaseTianying Chen, Haiyan Kang. 427-437 [doi]
- Frequent Itemset Mining with Differential Privacy Based on Transaction TruncationYing Xia, Yu Huang, Xu Zhang, HaeYoung Bae. 438-445 [doi]
- Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential PrivacyHai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian, Laifeng Lu. 446-458 [doi]
- The De-anonymization Method Based on User Spatio-Temporal Mobility TraceZhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li. 459-471 [doi]
- Privacy-Preserving Disease Risk Test Based on Bloom FiltersJun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu. 472-486 [doi]
- Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage EfficiencyKazuki Yoneyama, Shogo Kimura. 489-501 [doi]
- Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its ApplicationsLingchen Li, Wenling Wu, Lei Zhang. 502-508 [doi]
- Hypercubes and Private Information RetrievalAnirban Basu, Rui Xu, Juan Camilo Corena, Shinsaku Kiyomoto. 509-515 [doi]
- A Multi-client Dynamic Searchable Symmetric Encryption System with Physical DeletionLei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang. 516-528 [doi]
- High-Performance Symmetric Cryptography Server with GPU AccelerationWangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li. 529-540 [doi]
- An Experimental Study of Kannan's Embedding Technique for the Search LWE ProblemYuntao Wang, Yoshinori Aono, Tsuyoshi Takagi. 541-553 [doi]
- A Security-Enhanced vTPM 2.0 for Cloud ComputingJuan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang. 557-569 [doi]
- SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based SystemsRuan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval. 570-581 [doi]
- A Cross-Modal CCA-Based Astroturfing Detection ApproachXiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu. 582-592 [doi]
- Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server EnvironmentsZhiqiang Xu, Debiao He, Xinyi Huang. 595-605 [doi]
- Authenticated Group Key Agreement Protocol Without PairingGaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala. 606-618 [doi]
- Machine Learning for Black-Box Fuzzing of Network ProtocolsRong Fan, Yaoyao Chang. 621-632 [doi]
- A Novel Semantic-Aware Approach for Detecting Malicious Web TrafficJing Yang, Liming Wang, Zhen Xu. 633-645 [doi]
- An Active and Dynamic Botnet Detection Approach to Track Hidden Concept DriftZhi Wang, Meiqi Tian, Chunfu Jia. 646-660 [doi]
- Statically Defend Network Consumption Against Acker Failure Vulnerability in StormWenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu. 661-673 [doi]
- Pollution Attacks Identification in Structured P2P Overlay NetworksZied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem. 674-686 [doi]