Abstract is missing.
- An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS AttacksTing Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang. 3-24 [doi]
- A User-Friendly Centrally Banked CryptocurrencyXuan Han, Yamin Liu, Haixia Xu. 25-42 [doi]
- Contract Coin: Toward Practical Contract Signing on BlockchainHaibo Tian, Jiejie He, Liqing Fu. 43-61 [doi]
- TTP-free Fair Exchange of Digital Signatures with BitcoinWentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li. 62-81 [doi]
- The KDM-CCA Security of REACTJinyong Chang, Honglong Dai, MaoZhi Xu. 85-101 [doi]
- Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic EncryptionHaomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang. 102-117 [doi]
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data SharingKai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang. 118-135 [doi]
- New Proof for BKP IBE Scheme and Improvement in the MIMC SettingSong Luo, Lu Yan, Jian Weng, Zheng Yang. 136-155 [doi]
- A Secure Variant of the SRP Encryption Scheme with Shorter Private KeyBo Lv, Zhiniang Peng, Shaohua Tang. 156-167 [doi]
- Key Bit-Dependent Attack on Protected PKC Using a Single TraceBo-Yeon Sim, Dong-Guk Han. 168-185 [doi]
- Group-Based Source-Destination Verifiable Encryption with Blacklist CheckingZhongyuan Yao, Yi Mu, Guomin Yang. 186-203 [doi]
- Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper)Pratish Datta. 204-214 [doi]
- Optimizing Online Permutation-Based AE Schemes for Lightweight ApplicationsYu Sasaki, Kan Yasuda. 217-236 [doi]
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like CiphersXuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao. 237-255 [doi]
- Block Cipher Modes of Operation for Heterogeneous Format Preserving EncryptionToshiya Shimizu, Takeshi Shimoyama. 256-275 [doi]
- Compact Lossy and All-but-One Trapdoor Functions from LatticeLeixiao Cheng, Quanshui Wu, Yunlei Zhao. 279-296 [doi]
- A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesTrung Dinh, Ron Steinfeld, Nandita Bhattacharjee. 297-319 [doi]
- Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic EncryptionPradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda. 320-330 [doi]
- Verifiable Range Query Processing for Cloud ComputingYanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang, Jie Xiong. 333-349 [doi]
- Ranked Searchable Symmetric Encryption Supporting Conjunctive QueriesYanjun Shen, Peng Zhang. 350-360 [doi]
- A New Functional Encryption for Multidimensional Range Query (Short Paper)Jia Xu, Ee-Chien Chang, Jianying Zhou 0001. 361-372 [doi]
- Linearly Homomorphic Signatures with Designated EntitiesCheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang. 375-390 [doi]
- Efficient Certificate-Based Signature and Its AggregationXinxin Ma, Jun Shao, Cong Zuo, Ru Meng. 391-408 [doi]
- Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi. 409-421 [doi]
- Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper)Bei Liang, Aikaterini Mitrokotsa. 422-431 [doi]
- EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication SystemNa Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu. 435-453 [doi]
- Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password ChangingJian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun. 454-467 [doi]
- A Practical Authentication Protocol for Anonymous Web BrowsingXu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, YaLi Zeng. 468-482 [doi]
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data PrivacyClémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard. 485-505 [doi]
- Outsourcing Encrypted Excel FilesYa-nan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao. 506-524 [doi]
- Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud IntegrationYe Li, Zoe L. Jiang, Xuan Wang, S. M. Yiu, Jun-bin Fang. 525-538 [doi]
- Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper)Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard. 539-548 [doi]
- Fast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteXinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. V. Saraswathy, Zhe Liu. 551-565 [doi]
- Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han. 566-575 [doi]
- Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper)Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah. 576-586 [doi]
- Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper)Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang, Wen-Yu Kao. 587-598 [doi]
- Secure Communications in Unmanned Aerial Vehicle NetworkShuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Ya-nan Li. 601-620 [doi]
- On the Security of In-Vehicle Hybrid Network: Status and ChallengesTianxiang Huang, Jianying Zhou, Yi Wang, Anyu Cheng. 621-637 [doi]
- IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng. 638-647 [doi]
- Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper)Orhio Mark Creado, Phu Dung Le. 648-659 [doi]
- Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on FacebookJinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, Sebastian Schrittwieser. 663-677 [doi]
- Covert QR Codes: How to Hide in the CrowdYang-Wai Chow, Willy Susilo, Joonsang Baek. 678-693 [doi]
- Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper)Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang, Jin Li. 694-704 [doi]
- A Formal Model for an Ideal CFISepehr Minagar, Balasubramaniam Srinivasan, Phu Dung Le. 707-726 [doi]
- Defending Application Cache Integrity of Android RuntimeJia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem. 727-746 [doi]
- An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper)Zhi Wang, Meiqi Tian, Junnan Wang, Chunfu Jia. 747-758 [doi]
- Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)Lu Ren, Rui Chang, Qing Yin, Wei Wang. 759-769 [doi]
- Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper)Yong Tang, Yi Wang, Shuning Wei, Bo Yu, Qiang Yang. 770-779 [doi]
- Reasoning About Trust and Belief Change on a Social Network: A Formal ApproachAaron Hunter. 783-801 [doi]
- An Effective Authentication for Client Application Using ARM TrustZoneHang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang. 802-813 [doi]
- Generic Framework for Attribute-Based Group SignatureVeronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch. 814-834 [doi]
- An Improved Leveled Fully Homomorphic Encryption Scheme over the IntegersXiaoqiang Sun, Peng Zhang 0029, Jianping Yu, Weixin Xie. 835-846 [doi]
- The ECCA Security of Hybrid EncryptionsHonglong Dai, Jinyong Chang, Zhenduo Hou, MaoZhi Xu. 847-859 [doi]
- A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile DevicesHooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang-Jaccard, Hans W. Guesgen. 860-876 [doi]
- A Secure and Practical Signature Scheme for Blockchain Based on BiometricsYosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki. 877-891 [doi]
- Toward Fuzz Test Based on Protocol Reverse EngineeringJun Cai, Jian-Zhen Luo, Jianliang Ruan, Yan Liu. 892-897 [doi]
- How Spam Features Change in Twitter and the Impact to Machine Learning Based DetectionTingmin Wu, Derek Wang, Sheng Wen, Yang Xiang. 898-904 [doi]