Abstract is missing.
- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMsYongge Wang, Qutaibah M. Malluhi. 3-19 [doi]
- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced SettingHanyu Li, Ying Gao. 20-39 [doi]
- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design FilesMark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey Todd McDonald, Moti Yung. 40-52 [doi]
- Witness Encryption from Smooth Projective Hashing SystemYuzhu Wang, Mingwu Zhang. 53-72 [doi]
- More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard ModelKyoichi Asano, Keita Emura, Atsushi Takayasu. 75-83 [doi]
- QUIC Protocol with Post-quantum AuthenticationManohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou 0002, Sang-Yoon Chang. 84-91 [doi]
- Batched Fully Homomorphic Encryption from TFHEYuting Jiang, Jianghong Wei. 92-109 [doi]
- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel RealizationZhao Chen, Xianhui Lu, Dingding Jia, Bao Li 0001. 110-130 [doi]
- Further Cryptanalysis of a Type of RSA VariantsGongyu Shi, Geng Wang, Dawu Gu. 133-152 [doi]
- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64Yingying Li, Qichun Wang. 153-161 [doi]
- Efficient Scalar Multiplication on Koblitz Curves with Pre-computationXiuxiu Li, Wei Yu 0008, Kunpeng Wang. 162-172 [doi]
- Efficient ECDSA-Based Adaptor Signature for Batched Atomic SwapsBinbin Tu, Min Zhang, Chen Yu. 175-193 [doi]
- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair RealizationJianzhang Chen, Haibo Tian, Fangguo Zhang. 194-213 [doi]
- GRUZ: Practical Resource Fair Exchange Without BlockchainYongqing Xu, Kaiyi Zhang, Yu Yu 0001. 214-228 [doi]
- Daric: A Storage Efficient Payment Channel with Punishment MechanismArash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld. 229-249 [doi]
- A Blockchain-Based Mutual Authentication Protocol for Smart HomeBiwen Chen, Bo Tang, Shangwei Guo, Jiyun Yang, Tao Xiang. 250-265 [doi]
- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration ControlYanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal. 269-289 [doi]
- EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual SummariesAlmuthanna Alageel, Sergio Maffeis. 290-316 [doi]
- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat IntelligenceYan Lin Aung, Martín Ochoa, Jianying Zhou 0001. 319-338 [doi]
- Dissecting Applications Uninstallers and Removers: Are They Effective?Marcus Botacin, André Grégio. 339-359 [doi]
- Representing LLVM-IR in a Code Property GraphAlexander Küchler, Christian Banse. 360-380 [doi]
- Why We Need a Theory of Maliciousness: Hardware Performance Counters in SecurityMarcus Botacin, André Grégio. 381-389 [doi]
- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System ReplayRunhao Liu, Bo Yu 0008, Baosheng Wang, Jianbin Ye. 390-407 [doi]
- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise RecognitionShaofeng Wang, Bo Lang, Nan Xiao, Yikai Chen. 411-421 [doi]
- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest CloudLonglong Sun, Hui Li 0006, Shiwen Yu, XinDi Ma, Yanguo Peng, JiangTao Cui. 422-442 [doi]
- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64Lijun Lyu, Yi Tu, Yingjie Zhang. 443-463 [doi]
- CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer NetworksQian Chen, Zilong Wang 0001, Yilin Zhou, Jiawei Chen 0001, Dan Xiao, Xiaodong Lin 0001. 464-472 [doi]
- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile CrowdsensingShijin Chen, Mingwu Zhang, Bo Yang 0003. 473-490 [doi]
- Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed SensingDi Xiao 0001, Xue Tan, Min Li 0021. 491-508 [doi]