|
|
|
Security and Privacy in the IoT |
|
|
3 | (8) |
|
|
On Crossroads of Privacy Protection |
|
|
11 | (10) |
|
|
The Dual Role of Smartphones in IoT Security |
|
|
21 | (6) |
|
|
Cryptographic Protocols and Algorithms |
|
|
|
Implementing Indistinguishability Obfuscation Using GGH15 |
|
|
27 | (17) |
|
|
|
|
From Attack on Feige-Shamir to Construction of Oblivious Transfer |
|
|
44 | (21) |
|
|
|
|
A New Lattice Sieving Algorithm Base on Angular Locality-Sensitive Hashing |
|
|
65 | (16) |
|
|
|
A Simpler Bitcoin Voting Protocol |
|
|
81 | (18) |
|
|
|
|
Post-Quantum Secure Remote Password Protocol from RLWE Problem |
|
|
99 | (18) |
|
|
|
|
|
Hashing into Twisted Jacobi Intersection Curves |
|
|
117 | (24) |
|
|
|
|
|
|
Identity-Based Key-Insulated Aggregate Signatures, Revisited |
|
|
141 | (16) |
|
|
|
|
A New Constant-Size Accountable Ring Signature Scheme Without Random Oracles |
|
|
157 | (23) |
|
|
|
A Universal Designated Multi-Verifier Transitive Signature Scheme |
|
|
180 | (16) |
|
|
|
|
|
|
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme |
|
|
196 | (15) |
|
|
|
|
|
|
|
|
|
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data |
|
|
211 | (12) |
|
|
|
|
|
Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes) |
|
|
223 | (19) |
|
|
|
|
Fully Homomorphic Encryption Scheme Based on Public Key Compression and Batch Processing |
|
|
242 | (18) |
|
|
|
|
Leveled FHE with Matrix Message Space |
|
|
260 | (18) |
|
|
|
|
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext |
|
|
278 | (23) |
|
|
|
|
|
|
|
NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries |
|
|
301 | (20) |
|
|
|
|
|
|
|
|
A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs |
|
|
321 | (21) |
|
|
|
|
|
Cryptanalysis of Acorn in Nonce-Reuse Setting |
|
|
342 | (20) |
|
|
|
An Improved Method to Unveil Malware's Hidden Behavior |
|
|
362 | (21) |
|
|
|
|
|
|
|
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces |
|
|
383 | (21) |
|
|
|
|
|
|
|
Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling |
|
|
404 | (23) |
|
|
|
|
|
|
|
|
Meet in the Middle Attack on Type-1 Feistel Construction |
|
|
427 | (20) |
|
|
|
|
|
|
Influence of Error on Hamming Weights for ASCA |
|
|
447 | (14) |
|
|
|
|
|
|
State-of-the-Art: Security Competition in Talent Education |
|
|
461 | (21) |
|
|
|
|
|
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures |
|
|
482 | (18) |
|
|
|
|
|
|
|
|
|
NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment |
|
|
500 | (18) |
|
|
|
|
A Method to Enlarge the Design Distance of BCH Codes and Some Classes of Infinite Optimal Cyclic Codes |
|
|
518 | (11) |
|
|
|
Author Index |
|
529 | |