{"title":"Hierarchical Group Signatures with Verifier-Local Revocation","authors":"Lin Hou, Renzhang Liu, Tian Qiu, D. Lin","doi":"10.1007/978-3-030-01950-1_16","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_16","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linking Differential Identifiability with Differential Privacy","authors":"Anis Bkakria, N. Cuppens-Boulahia, F. Cuppens","doi":"10.1007/978-3-030-01950-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_14","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation","authors":"Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong","doi":"10.1007/978-3-030-01950-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_9","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Weakness of Constant Blinding PRNG in Flash Player","authors":"Chenyu Wang, Tao Huang, Hongjun Wu","doi":"10.1007/978-3-030-01950-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_7","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127710797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dan Tang, Rui Dai, L. Tang, Sijia Zhan, Jianping Man
{"title":"Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis","authors":"Dan Tang, Rui Dai, L. Tang, Sijia Zhan, Jianping Man","doi":"10.1007/978-3-030-01950-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_6","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122317256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX","authors":"Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng","doi":"10.1007/978-3-030-01950-1_47","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_47","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage","authors":"Cédric Van Rompay, R. Molva, Melek Önen","doi":"10.1007/978-3-030-01950-1_23","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_23","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123971377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Packet Inspection with Delayed Signature Matching in Network Auditing","authors":"Yingpei Zeng, Shanqing Guo","doi":"10.1007/978-3-030-01950-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_5","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications","authors":"Mingjiang Huang, Liming Wang, Yan Zhang","doi":"10.1007/978-3-030-01950-1_39","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_39","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"74 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123113166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity-Based Functional Encryption for Quadratic Functions from Lattices","authors":"Kelly Yun, Xin Wang, Rui Xue","doi":"10.1007/978-3-030-01950-1_24","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_24","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}