|
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain |
|
|
1 | (15) |
|
|
|
|
|
|
Analysis on the Block Reward of Fork After Withholding (FAW) |
|
|
16 | (16) |
|
|
|
|
|
|
|
Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs |
|
|
32 | (14) |
|
|
|
|
Burn After Reading: Expunging Execution Footprints of Android Apps |
|
|
46 | (18) |
|
|
|
|
|
A Comprehensive Study of Permission Usage on Android |
|
|
64 | (16) |
|
|
|
|
|
|
|
|
Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices |
|
|
80 | (15) |
|
|
|
|
Anonymous Attribute-Based Conditional Proxy Re-encryption |
|
|
95 | (16) |
|
|
|
|
|
|
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity |
|
|
111 | (14) |
|
|
|
|
|
|
|
Multi-user Forward Secure Dynamic Searchable Symmetric Encryption |
|
|
125 | (16) |
|
|
|
|
|
Towards Security Authentication for IoT Devices with Lattice-Based ZK |
|
|
141 | (10) |
|
|
|
|
|
|
|
Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud |
|
|
151 | (9) |
|
|
|
Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics |
|
|
160 | (14) |
|
|
|
|
|
Walking on the Cloud: Gait Recognition, a Wearable Solution |
|
|
174 | (13) |
|
|
|
|
|
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control |
|
|
187 | (15) |
|
|
|
|
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control |
|
|
202 | (10) |
|
|
|
|
|
Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke |
|
|
212 | (9) |
|
|
|
|
Real-Time IoT Device Activity Detection in Edge Networks |
|
|
221 | (16) |
|
|
|
|
|
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi |
|
|
237 | (14) |
|
|
|
|
|
|
Analyzing the Communication Security Between Smartphones and IoT Based on CORAS |
|
|
251 | (15) |
|
|
|
|
|
Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture |
|
|
266 | (11) |
|
|
|
|
|
|
LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices |
|
|
277 | (11) |
|
|
|
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs |
|
|
288 | (16) |
|
|
|
|
|
|
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search |
|
|
304 | (15) |
|
Francisco-Javier Rodrigo-Gines |
|
|
|
|
|
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks |
|
|
319 | (18) |
|
|
|
|
|
|
User Relationship Classification of Facebook Messenger Mobile Data using WEKA |
|
|
337 | (12) |
|
|
|
|
|
Using Software Visualization for Supporting the Teaching of MapReduce |
|
|
349 | (12) |
|
|
DBAF: Dynamic Binary Analysis Framework and Its Applications |
|
|
361 | (15) |
|
|
|
|
|
|
Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows |
|
|
376 | (15) |
|
|
|
|
ATPG Binning and SAT-Based Approach to Hardware Trojan Detection for Safety-Critical Systems |
|
|
391 | (20) |
|
|
|
|
Android Mai ware Detection Methods Based on the Combination of Clustering and Classification |
|
|
411 | (12) |
|
|
|
|
|
|
An OpenvSwitch Extension for SDN Traceback |
|
|
423 | (13) |
|
|
|
|
|
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks |
|
|
436 | (16) |
|
|
|
|
|
|
Creating and Managing Realism in the Next-Generation Cyber Range |
|
|
452 | (11) |
|
|
|
|
Understanding the Behaviors of BGP-based DDoS Protection Services |
|
|
463 | (11) |
|
|
|
|
Position Paper on Blockchain Technology: Smart Contract and Applications |
|
|
474 | (10) |
|
|
|
|
|
|
|
|
|
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT |
|
|
484 | (7) |
|
|
|
|
|
|
Author Index |
|
491 | |