All Stories

  1. New Permutation Decomposition Techniques for Efficient Homomorphic Permutation
  2. GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients
  3. A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures
  4. CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses
  5. Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup
  6. Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual
  7. P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
  8. Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception
  9. Short Principal Ideal Problem in multicubic fields
  10. Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices
  11. Multi Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
  12. Security, Privacy, and Trust for Cyberphysical-Social Systems
  13. Securely Reinforcing Synchronization for Embedded Online Contests
  14. An efficient and provably secure RFID grouping proof protocol
  15. Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data
  16. Anonymous Yoking-Group Proofs
  17. Generalized closest substring encryption
  18. Fair Multi-signature
  19. A short ID-based proxy signature scheme
  20. Information Security and Privacy
  21. Fully Homomorphic Encryption Using Hidden Ideal Lattice
  22. A robust smart card-based anonymous user authentication protocol for wireless communications
  23. Deniability and forward secrecy of one-round authenticated key exchange
  24. Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme
  25. Provable Security
  26. Efficient oblivious transfers with access control
  27. Information Security and Privacy
  28. Information and Communications Security
  29. Self-certified ring signatures
  30. CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs
  31. Recursive Lattice Reduction
  32. Improving Software Testing Cost-Effectiveness through Dynamic Partitioning
  33. Biometrics for Electronic Health Records
  34. Information Security and Privacy
  35. Information Security Practice and Experience
  36. Provable Security
  37. Personal Health Record Systems and Their Security Protection
  38. Securing Mobile Data Computing in Healthcare