×

Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. (English) Zbl 1398.68037

Lecture Notes in Computer Science 11149. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). xv, 818 p. (2018).

Show indexed articles as search result.

The articles of mathematical interest will be reviewed individually. For the preceding conference see [Zbl 1435.68039].
Indexed articles:
Zhang, Yuan; Lin, Xiaodong; Xu, Chunxiang, Blockchain-based secure data provenance for cloud storage, 3-19 [Zbl 1458.94175]
Kopp, Henning; Kargl, Frank; Bösch, Christoph; Peter, Andreas, uMmine: a blockchain based on human miners, 20-38 [Zbl 1458.94253]
Zeng, Yingpei; Guo, Shanqing, Deep packet inspection with delayed signature matching in network auditing, 75-91 [Zbl 1458.94317]
Tang, Dan; Dai, Rui; Tang, Liu; Zhan, Sijia; Man, Jianping, Low-rate DoS attack detection based on two-step cluster analysis, 92-104 [Zbl 1497.68080]
Teşeleanu, George, Random number generators can be fooled to behave badly, 124-141 [Zbl 1508.68031]
Hashim, Shakirah; Benaissa, Mohammed, Accelerating integer based fully homomorphic encryption using frequency domain multiplication, 161-176 [Zbl 1458.94241]
Barenghi, Alessandro; Mainardi, Nicholas; Pelosi, Gerardo, Comparison-based attacks against noise-free fully homomorphic encryption schemes, 177-191 [Zbl 1458.94213]
Breuer, Peter T.; Bowen, Jonathan P.; Palomar, Esther; Liu, Zhiming, On security in encrypted computing, 192-211 [Zbl 1497.68074]
Zheng, Meng; Zhou, Jun; Cao, Zhenfu; Dong, Xiaolei, PPOIM: privacy-preserving shape context based image denoising and matching with efficient outsourcing, 215-231 [Zbl 1458.94066]
Bkakria, Anis; Cuppens-Boulahia, Nora; Cuppens, Frédéric, Linking differential identifiability with differential privacy, 232-247 [Zbl 1458.94215]
Chen, Zhili; Chen, Sheng; Zhong, Hong; Chen, Lin; Tian, Miaomiao, PP-MCSA: privacy preserving multi-channel double spectrum auction, 248-267 [Zbl 1458.94226]
Hou, Lin; Liu, Renzhang; Qiu, Tian; Lin, Dongdai, Hierarchical group signatures with verifier-local revocation, 271-286 [Zbl 1458.94303]
Perera, Maharage Nisansala Sevwandi; Koshiba, Takeshi, Achieving full security for lattice-based group signatures with verifier-local revocation, 287-302 [Zbl 1458.94312]
Baum, Carsten; Lin, Huang; Oechsner, Sabine, Towards practical lattice-based one-time linkable ring signatures, 303-322 [Zbl 1458.94293]
Xu, Jian; Yun, Xiaochun; Zhang, Yongzheng; Cheng, Zhenyu, Community discovery of attribution trace based on deep learning approach, 342-357 [Zbl 1497.68081]
Guo, Yun; Sun, Daniel; Li, Guoqiang; Chen, Shiping, Examine manipulated datasets with topology data analysis: a case study, 358-373 [Zbl 1458.94174]
Liang, Yunong; Cao, Zhenfu; Dong, Xiaolei; Shen, Jiachen, Efficient multi-keyword searchable encryption based on multi-input inner-product functional encryption, 377-392 [Zbl 1458.94260]
Van Rompay, Cédric; Molva, Refik; Önen, Melek, Fast two-server multi-user searchable encryption with strict access pattern leakage, 393-408 [Zbl 1458.94284]
Yun, Kelly; Wang, Xin; Xue, Rui, Identity-based functional encryption for quadratic functions from lattices, 409-425 [Zbl 1458.94288]
Zhang, Rui; Tao, Yang, Key dependent message security for revocable identity-based encryption and identity-based encryption, 426-441 [Zbl 1458.94289]
Yang, Changsong; Wang, Jianfeng; Tao, Xiaoling; Chen, Xiaofeng, Publicly verifiable data transfer and deletion scheme for cloud storage, 445-458 [Zbl 1458.94286]
Kopp, Henning; Kargl, Frank; Bösch, Christoph, Publicly verifiable static proofs of storage: a novel scheme and efficiency comparisons, 459-477 [Zbl 1458.94252]
Wang, Xingfeng; Zhao, Liang, Verifiable single-server private information retrieval, 478-493 [Zbl 1497.68156]
Di Crescenzo, Giovanni; Bahler, Lisa; Coan, Brian, Cryptographic password obfuscation, 497-512 [Zbl 1458.94298]
Cheng, Haitao; Li, Xiangxue; Qian, Haifeng; Yan, Di, CCA secure multi-recipient KEM from LPN, 513-529 [Zbl 1458.94223]
Anada, Hiroaki; Arita, Seiko, Witness-indistinguishable arguments with \(\varSigma\)-protocols for bundled witness spaces and its application to global identities, 530-547 [Zbl 1458.94210]
Han, Xiaohui; Wang, Lianhai; Xu, Shujiang; Zhao, Dawei; Liu, Guangqi, Role recognition of illegal online gambling participants using monetary transaction data, 584-597 [Zbl 1459.91232]
Lu, Yao; Kunihiro, Noboru; Zhang, Rui; Peng, Liqiang; Ma, Hui, Certifying variant of RSA with generalized moduli, 598-608 [Zbl 1458.94264]
Kammüller, Florian, Attack trees in Isabelle, 611-628 [Zbl 1497.68548]
Zhang, Fan; Zhang, Cong; Xu, Mingdi; Liu, Xiaoli; Hu, Fangning; Chao, HanChieh, Automated verification of noninterference property, 629-646 [Zbl 1458.94173]
Han, Ya; Li, Yongqiang; Wang, Mingsheng, Automatical method for searching integrals of ARX block cipher with division property using three subsets, 647-663 [Zbl 1458.94240]
Huang, Mingjiang; Wang, Liming; Zhang, Yan, Improved automatic search algorithm for differential and linear cryptanalysis on SIMECK and the applications, 664-681 [Zbl 1458.94243]
Ji, Xiaoshu; Le Guernic, Gurvan; Cuppens-Boulahia, Nora; Cuppens, Frédéric, USB packets filtering policies and an associated low-cost simulation framework, 732-742 [Zbl 1461.93504]
Lara-Nino, Carlos Andres; Diaz-Perez, Arturo; Morales-Sandoval, Miguel, FPGA-based assessment of Midori and Gift lightweight block ciphers, 745-755 [Zbl 1458.94257]
Cheng, Haitao; Li, Xiangxue; Qian, Haifeng; Yan, Di, Simpler CCA secure PKE from LPN problem without double-trapdoor, 756-766 [Zbl 1458.94224]
Bui, Thanh; Aura, Tuomas, Application of public ledgers to revocation in distributed access control, 781-792 [Zbl 1458.94219]
Ni, Peifang; Li, Hongda; Pan, Dongxue, Micropaying to a distributed payee with instant confirmation, 793-804 [Zbl 1456.91137]
Wang, Ping; Zhang, Zijian; Wang, Ding, Revisiting anonymous two-factor authentication schemes for multi-server environment, 805-816 [Zbl 1458.94316]

MSC:

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
68P25 Data encryption (aspects in computer science)
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest

Citations:

Zbl 1435.68039
PDFBibTeX XMLCite
Full Text: DOI