


default search action
23rd ISC 2020: Bali, Indonesia
- Willy Susilo

, Robert H. Deng
, Fuchun Guo
, Yannan Li
, Rolly Intan:
Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings. Lecture Notes in Computer Science 12472, Springer 2020, ISBN 978-3-030-62973-1
Public-Key Cryptography
- Xiaopeng Zhao, Zhenfu Cao

, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE from Quadratic Residuosity with Fast Encryption. 3-19 - Masahito Ishizaka, Shinsaku Kiyomoto:

Time-Specific Signatures. 20-38 - Rouzbeh Behnia, Attila Altay Yavuz

, Muslum Ozgur Ozmen, Tsz Hon Yuen
:
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. 39-58 - Soma Murata

, Daiki Miyahara
, Takaaki Mizuki
, Hideaki Sone
:
Public-PEZ Cryptography. 59-74 - Xin Chen, Liang Feng Zhang:

Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials. 75-91
Symmetric-Key Cryptography and Lattice
- Youle Xu, Qichun Wang:

Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance. 95-106 - Hiroki Okada

, Shinsaku Kiyomoto, Carlos Cid:
Integerwise Functional Bootstrapping on TFHE. 107-125
Attacks and Cryptanalysis
- Ryoma Ito

:
Rotational Cryptanalysis of Salsa Core Function. 129-145 - Ge Cheng

, Hui Xie
, Dongliang Zhang
:
Analyzing the Chain of Trust Model Based on Entity Dependence. 146-159 - Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, Jingzi Meng:

Evaluation on the Security of Commercial Cloud Container Services. 160-177 - Haoyu Ma

, Jianwen Tian, Debin Gao
, Chunfu Jia:
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel. 178-195
Malware Analysis
- Jamie Pont

, Budi Arief
, Julio C. Hernandez-Castro
:
Why Current Statistical Approaches to Ransomware Detection Fail. 199-216 - Kai Chih Chang

, Razieh Nokhbeh Zaeem
, K. Suzanne Barber
:
A Framework for Estimating Privacy Risk Scores of Mobile Apps. 217-233 - Jorge Sanz Maroto, Haoyu Liu

, Paul Patras:
On the Struggle Bus: A Detailed Security Analysis of the m-tickets App. 234-252
Network and System Security
- Zuchao Ma, Liang Liu, Weizhi Meng

:
ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks. 255-273 - Saihua Cai

, Jinfu Chen, Xinru Li, Bo Liu:
Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints. 274-289 - Don Kuzhiyelil, Philipp Zieris

, Marine Kadar, Sergey Tverdyshev
, Gerhard Fohler
:
Towards Transparent Control-Flow Integrity in Safety-Critical Systems. 290-311
Blokchain
- Abba Garba

, Arne Bochem
, Benjamin Leiding
:
BlockVoke - Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust. 315-333 - Junming Ke, Pawel Szalachowski, Jianying Zhou

, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. 334-351 - Xiaoqi Li

, Ting Chen, Xiapu Luo, Jiangshan Yu
:
Characterizing Erasable Accounts in Ethereum. 352-371 - Rujia Li, Qin Wang

, Feng Liu
, Qi Wang
, David Galindo:
An Accountable Decryption System Based on Privacy-Preserving Smart Contracts. 372-390
Security Applications
- Mauro Conti

, Pier Paolo Tricomi
:
PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition. 393-408 - Alberto Blanco-Justicia

, Josep Domingo-Ferrer
:
Privacy-Preserving Computation of the Earth Mover's Distance. 409-423

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














