All Stories

  1. CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses
  2. Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup
  3. Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual
  4. P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
  5. Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception
  6. Short Principal Ideal Problem in multicubic fields
  7. Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices
  8. Multi Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
  9. Security, Privacy, and Trust for Cyberphysical-Social Systems
  10. Securely Reinforcing Synchronization for Embedded Online Contests
  11. An efficient and provably secure RFID grouping proof protocol
  12. Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data
  13. Anonymous Yoking-Group Proofs
  14. Generalized closest substring encryption
  15. Fair Multi-signature
  16. A short ID-based proxy signature scheme
  17. Information Security and Privacy
  18. Fully Homomorphic Encryption Using Hidden Ideal Lattice
  19. A robust smart card-based anonymous user authentication protocol for wireless communications
  20. Deniability and forward secrecy of one-round authenticated key exchange
  21. Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme
  22. Provable Security
  23. Efficient oblivious transfers with access control
  24. Information Security and Privacy
  25. Information and Communications Security
  26. Self-certified ring signatures
  27. CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs
  28. Recursive Lattice Reduction
  29. Improving Software Testing Cost-Effectiveness through Dynamic Partitioning
  30. Biometrics for Electronic Health Records
  31. Information Security and Privacy
  32. Information Security Practice and Experience
  33. Provable Security
  34. Personal Health Record Systems and Their Security Protection
  35. Securing Mobile Data Computing in Healthcare