Abstract is missing.
- Secure Federated Distillation Framework for Encrypted Traffic ClassificationLong Teng, Qi Feng, Wei Zhao, Min Luo 0002, Debiao He. 1-19 [doi]
- TriNT: A Framework for ROV Identification Based on TripletYujing Liu, Jiangbin Chen, Shuhui Chen. 20-32 [doi]
- Lattice-Based Universal Designated Multi-verifiers Signature SchemeYanhua Zhang, Willy Susilo, Yan Chen, Fuchun Guo, Jiaming Wen 0001. 33-54 [doi]
- Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling ScenarioHailong Zhang 0001. 55-74 [doi]
- Shrinkable Ring Signatures: It Wasn't Them!Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto. 75-93 [doi]
- Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BCKangkang Shi, Jiongjiong Ren, Shaozhen Chen. 94-111 [doi]
- Isogeny-Based Password-Authenticated Key Exchange Based on Shuffle AlgorithmCongrong Peng, Cong Peng 0005, Xiaolin Yang, Qingcai Luo, Min Luo 0002. 112-132 [doi]
- A New Construction of Leakage-Resilient Identity-Based Encryption SchemeZirui Qiao, Ran Xu 0012, Yonghui Lu, Yanwei Zhou, Bo Yang 0003. 133-150 [doi]
- Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against KyberPeng Chen, Chi Cheng, Jinnuo Li, Tianqing Zhu. 151-167 [doi]
- Generic CCA Secure Key Homomorphic KEM and Updatable Public Key EncryptionKaiming Chen, Atsuko Miyaji, Jiageng Chen. 168-185 [doi]
- Breaking GEA-Like Stream Ciphers with Lower Time CostZheng Wu, Lin Ding 0001, Zhengting Li, Xinhai Wang. 186-204 [doi]
- SNIPER: Detect Complex Attacks Accurately from TrafficChanglong Yu, Bo Zhang, Boyu Kuang, Anmin Fu. 205-221 [doi]
- From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning FrameworkLiwei Liu, Zijian Liu, Na Ruan. 222-239 [doi]
- Efficient Large-Scale Multi-party Computation Based on Garbled CircuitZhusen Liu, Jiafei Wu, Zhe Liu 0001. 240-257 [doi]
- Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing ArchitecturesMengsi Wu, Pei Li, Jiageng Chen, Shixiong Yao. 258-272 [doi]
- Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware DetectionMd Mashrur Arifin, Troy Suyehara Tolman, Jyh-haw Yeh. 273-291 [doi]
- An eID-Based Privacy-Enhanced Public Transportation Ticket SystemKanagaratnam Anojjan, Weizhi Meng 0001, Brooke Kidmose, Yu Wang 0017. 292-309 [doi]
- Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine LearningHong Qin 0009, Debiao He, Qi Feng, Xiaolin Yang, Qingcai Luo. 310-328 [doi]
- Controlled Multi-client Functional Encryption for Flexible Access ControlMingwu Zhang, Yulu Zhong, Yifei Wang, Yuntao Wang. 329-346 [doi]
- A Secure Incentive Mechanism in Blockchain-Based Mobile CrowdsensingMingwu Zhang, Qi Zou, Bo Yang. 347-364 [doi]
- A Comparative Analysis of Phishing Tools: Features and CountermeasuresRishikesh Sahay, Weizhi Meng 0001, Wenjuan Li 0001. 365-382 [doi]
- OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoTYudi Zhang 0001, Yumei Li 0003, Mingwu Zhang, Willy Susilo. 383-402 [doi]