Abstract is missing.
- Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery AttacksBagus Santoso, Yasutada Oohama, Chunhua Su. 3-17 [doi]
- Unsupervised Insider Detection Through Neural Feature Learning and Model OptimisationLiu Liu 0008, Chao Chen 0015, Jun Zhang 0010, Olivier Y. de Vel, Yang Xiang 0001. 18-36 [doi]
- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A SurveyQingqing Gan, Cong Zuo, Jianfeng Wang, Shifeng Sun, Xiaoming Wang 0004. 37-52 [doi]
- A Graph Database-Based Approach to Analyze Network Log FilesLars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac. 53-73 [doi]
- A Privacy-Enhancing Framework for Internet of Things ServicesLukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci. 77-97 [doi]
- Using Audio Characteristics for Mobile Device AuthenticationMatthew Dekker, Vimal Kumar. 98-113 [doi]
- Ethereum Analysis via Node ClusteringHanyi Sun, Na Ruan, Hanqing Liu. 114-129 [doi]
- Strong Known Related-Key Attacks and the Security of ECDSATsz Hon Yuen, Siu-Ming Yiu. 130-145 [doi]
- Threat Assessment of Enterprise Applications via Graphical ModellingManjunath Bilur, Anugrah Gari, R. K. Shyamasundar. 146-166 [doi]
- A Blockchain-Based IoT Data Management System for Secure and Scalable Data SharingYawei Wang, Chenxu Wang, Xiapu Luo, Kaixiang Zhang, Huizhong Li. 167-184 [doi]
- Towards Secure Open Banking Architecture: An Evaluation with OWASPDeina Kellezi, Christian Boegelund, Weizhi Meng. 185-198 [doi]
- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic ZoomsLuís Dias, Hélder Reia, Rui Neves 0001, Miguel Correia 0001. 199-220 [doi]
- OVERSCAN: OAuth 2.0 Scanner for Missing ParametersKarin Sumongkayothin, Pakpoom Rachtrachoo, Arnuphap Yupuech, Kasidit Siriporn. 221-233 [doi]
- LaT-Voting: Traceable Anonymous E-Voting on BlockchainPeng Li, Junzuo Lai. 234-254 [doi]
- Distributed Secure Storage System Based on Blockchain and TPAHuili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu. 255-271 [doi]
- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain TechniqueZhentian Xiong, Zoe L. Jiang, Shuqiang Yang, Xuan Wang 0002, Junbin Fang. 272-287 [doi]
- A Practical Dynamic Enhanced BFT ProtocolFeng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, Ning Liu. 288-304 [doi]
- Pre-adjustment Based Anti-collusion Mechanism for Audio SignalsJuan Zhao, Tianrui Zong, Yong Xiang 0001, Longxiang Gao, Gleb Beliakov. 305-319 [doi]
- Detecting Intruders by User File Access PatternsShou-Hsuan Stephen Huang, Zechun Cao, Calvin E. Raines, Mai N. Yang, Camille Simon. 320-335 [doi]
- Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network ArchitectureXinshu Ma, Chunpeng Ge, Zhe Liu. 336-351 [doi]
- Privacy Preserving Machine Learning with Limited Information LeakageWenyi Tang, Bo Qin, Suyun Zhao, Boning Zhao, Yunzhi Xue, Hong Chen. 352-370 [doi]
- Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoTGabriel Jerome Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks. 371-386 [doi]
- Sequential Aggregate MACs with Detecting Functionality RevisitedShingo Sato, Shoichi Hirose, Junji Shikata. 387-407 [doi]
- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation SystemLi Zhang, Zhuo Lv, Xuesong Zhang, Cen Chen, Nuannuan Li, Yidong Li, Wei Wang 0012. 408-417 [doi]
- EEG-Based Person Authentication with Variational Universal Background ModelHuyen Tran, Dat Tran, Wanli Ma, Phuoc Nguyen. 418-432 [doi]
- An Efficient Vulnerability Detection Model for Ethereum Smart ContractsJingjing Song, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, Wei Wang 0012. 433-442 [doi]
- A Comparative Study on Network Traffic ClusteringYang Liu, Hanxiao Xue, Guocheng Wei, Lisu Wu, Yu Wang 0017. 443-455 [doi]
- Tell Them from Me: An Encrypted Application ProfilerMohammad Saiful Islam Mamun, Rongxing Lu, Manon Gaudet. 456-471 [doi]
- Indoor Security Localization Algorithm Based on Location Discrimination Ability of APJuan Luo, Lei Yang, Chun Wang, Huan Zhao. 472-487 [doi]
- Gnocchi: Multiplexed Payment Channels for CryptocurrenciesChen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu. 488-503 [doi]
- Difficulty of Decentralized Structure Due to Rational User Behavior on BlockchainMitsuyoshi Imamura, Kazumasa Omote. 504-519 [doi]
- A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data ExfiltrationJiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma. 520-535 [doi]
- Cryptanalysis of Raindrop and FBCBingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang. 536-551 [doi]
- Attribute-Based Encryption with Publicly Verifiable Outsourced DecryptionHui Zheng, Jun Shao, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao. 552-566 [doi]
- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence CostRongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou. 567-580 [doi]
- Lattice Based Verifiably Encrypted Double Authentication Preventing SignaturesJinhui Liu, Yong Yu 0002. 581-595 [doi]
- Privacy-Preserving Sequential Data PublishingHuili Wang, Wenping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu. 596-614 [doi]
- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo FilterKang Li, Wang Fat Lau, Man Ho Au. 615-631 [doi]
- Keyed Non-parametric Hypothesis TestsYao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache. 632-645 [doi]
- SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark PlatformSibghat Ullah Bazai, Julian Jang-Jaccard. 646-662 [doi]
- An Efficient Leakage-Resilient Authenticated Group Key Exchange ProtocolOu Ruan, Yang Yang, Mingwu Zhang. 665-674 [doi]
- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from LatticesMaharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama. 675-684 [doi]
- Privacy-Preserving k-means Clustering: an Application to Driving Style RecognitionOthmane El Omri, Aymen Boudguiga, Malika Izabachène, Witold Klaudel. 685-696 [doi]
- Derandomized PACE with Mutual AuthenticationAdam Bobowski, Miroslaw Kutylowski. 697-705 [doi]
- A Multi-attributes-Based Trust Model of Internet of VehicleWei Ou, Entao Luo, Zhiyuan Tan 0001, Lihong Xiang, Qin Yi, Chen Tian 0009. 706-713 [doi]
- Using Sparse Composite Document Vectors to Classify VBA MacrosMamoru Mimura. 714-720 [doi]
- A High-Performance Hybrid Blockchain System for Traceable IoT ApplicationsXu Wang 0004, Ping Yu, Guangsheng Yu, Xuan Zha, Wei Ni 0001, Ren Ping Liu, Y. Jay Guo. 721-728 [doi]