Khan, Haibat; Dowling, Benjamin; Martin, Keith M. Identity confidentiality in 5G mobile telephony systems. (English) Zbl 1522.94063 Cremers, Cas (ed.) et al., Security standardisation research. 4th international conference, SSR 2018, Darmstadt, Germany, November 26–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11322, 120-142 (2018). MSC: 94A60 94A62 94A05 68P25 PDFBibTeX XMLCite \textit{H. Khan} et al., Lect. Notes Comput. Sci. 11322, 120--142 (2018; Zbl 1522.94063) Full Text: DOI
Qin, Baodong; Zhao, Qinglan; Zheng, Dong; Cui, Hui Server-aided revocable attribute-based encryption resilient to decryption key exposure. (English) Zbl 1519.68033 Capkun, Srdjan (ed.) et al., Cryptology and network security. 16th international conference, CANS 2017, Hong Kong, China, November 30 – December 2, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11261, 504-514 (2018). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{B. Qin} et al., Lect. Notes Comput. Sci. 11261, 504--514 (2018; Zbl 1519.68033) Full Text: DOI
Selvi, S. Sharmila Deva; Paul, Arinjita; Pandurangan, Chandrasekaran A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model. (English) Zbl 1521.94059 Capkun, Srdjan (ed.) et al., Cryptology and network security. 16th international conference, CANS 2017, Hong Kong, China, November 30 – December 2, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11261, 459-469 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. S. D. Selvi} et al., Lect. Notes Comput. Sci. 11261, 459--469 (2018; Zbl 1521.94059) Full Text: DOI
Maffei, Matteo; Reinert, Manuel; Schröder, Dominique On the security of frequency-hiding order-preserving encryption. (English) Zbl 1519.68073 Capkun, Srdjan (ed.) et al., Cryptology and network security. 16th international conference, CANS 2017, Hong Kong, China, November 30 – December 2, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11261, 51-70 (2018). MSC: 68P25 68M25 94A60 PDFBibTeX XMLCite \textit{M. Maffei} et al., Lect. Notes Comput. Sci. 11261, 51--70 (2018; Zbl 1519.68073) Full Text: DOI
Zhang, Chunming; Peng, Junbiao; Xiao, Jingwei Advanced persistent distributed denial of service attack model on scale-free networks. (English) Zbl 1519.68038 Liu, Feng (ed.) et al., Science of cyber security. First international conference, SciSec 2018, Beijing, China, August 12–14, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11287, 96-112 (2018). MSC: 68M25 68M10 68M11 PDFBibTeX XMLCite \textit{C. Zhang} et al., Lect. Notes Comput. Sci. 11287, 96--112 (2018; Zbl 1519.68038) Full Text: DOI
Zhang, Chunming Computer viruses propagation model on dynamic switching networks. (English) Zbl 1519.68037 Liu, Feng (ed.) et al., Science of cyber security. First international conference, SciSec 2018, Beijing, China, August 12–14, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11287, 81-95 (2018). MSC: 68M25 68M10 68M11 PDFBibTeX XMLCite \textit{C. Zhang}, Lect. Notes Comput. Sci. 11287, 81--95 (2018; Zbl 1519.68037) Full Text: DOI
Yan, Dingyu; Liu, Feng; Zhang, Yaqin; Jia, Kun; Zhang, Yuantian Characterizing the optimal attack strategy decision in cyber epidemic attacks with limited resources. (English) Zbl 1519.68036 Liu, Feng (ed.) et al., Science of cyber security. First international conference, SciSec 2018, Beijing, China, August 12–14, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11287, 65-80 (2018). MSC: 68M25 68M10 68M11 PDFBibTeX XMLCite \textit{D. Yan} et al., Lect. Notes Comput. Sci. 11287, 65--80 (2018; Zbl 1519.68036) Full Text: DOI
Qiang, Hao; Lu, Wenlian A note on dependence of epidemic threshold on state transition diagram in the SEIC cybersecurity dynamical system model. (English) Zbl 1519.68032 Liu, Feng (ed.) et al., Science of cyber security. First international conference, SciSec 2018, Beijing, China, August 12–14, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11287, 51-64 (2018). MSC: 68M25 68M10 68M11 PDFBibTeX XMLCite \textit{H. Qiang} and \textit{W. Lu}, Lect. Notes Comput. Sci. 11287, 51--64 (2018; Zbl 1519.68032) Full Text: DOI
Rahmattalabi, Aida; Vayanos, Phebe; Tambe, Milind A robust optimization approach to designing near-optimal strategies for constant-sum monitoring games. (English) Zbl 1521.91051 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 603-622 (2018). MSC: 91A65 68M18 68M25 90C11 PDFBibTeX XMLCite \textit{A. Rahmattalabi} et al., Lect. Notes Comput. Sci. 11199, 603--622 (2018; Zbl 1521.91051) Full Text: DOI
Wang, Wei; Zeng, Bo A two-stage deception game for network defense. (English) Zbl 1521.91030 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 569-582 (2018). MSC: 91A20 91A10 68M25 90C11 PDFBibTeX XMLCite \textit{W. Wang} and \textit{B. Zeng}, Lect. Notes Comput. Sci. 11199, 569--582 (2018; Zbl 1521.91030) Full Text: DOI
Basak, Anjon; Gutierrez, Marcus; Kiekintveld, Christopher Algorithms for subgame abstraction with applications to cyber defense. (English) Zbl 1521.91052 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 556-568 (2018). MSC: 91A68 91A05 91A80 68M25 PDFBibTeX XMLCite \textit{A. Basak} et al., Lect. Notes Comput. Sci. 11199, 556--568 (2018; Zbl 1521.91052) Full Text: DOI
Zhang, Tao; Zhu, Quanyan Hypothesis testing game for cyber deception. (English) Zbl 1521.91045 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 540-555 (2018). MSC: 91A28 68M25 PDFBibTeX XMLCite \textit{T. Zhang} and \textit{Q. Zhu}, Lect. Notes Comput. Sci. 11199, 540--555 (2018; Zbl 1521.91045) Full Text: DOI
Sayin, Muhammed O.; Hosseini, Hossein; Poovendran, Radha; Başar, Tamer A game theoretical framework for inter-process adversarial intervention detection. (English) Zbl 1519.68034 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 486-507 (2018). MSC: 68M25 91A65 91A80 PDFBibTeX XMLCite \textit{M. O. Sayin} et al., Lect. Notes Comput. Sci. 11199, 486--507 (2018; Zbl 1519.68034) Full Text: DOI
Clouse, Daniel; Burke, David Approximating power indices to assess cybersecurity criticality. (English) Zbl 1519.68026 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 346-365 (2018). MSC: 68M25 68W25 91A12 91A80 PDFBibTeX XMLCite \textit{D. Clouse} and \textit{D. Burke}, Lect. Notes Comput. Sci. 11199, 346--365 (2018; Zbl 1519.68026) Full Text: DOI
Sengupta, Sailik; Chowdhary, Ankur; Huang, Dijiang; Kambhampati, Subbarao Moving target defense for the placement of intrusion detection systems in the cloud. (English) Zbl 1519.68011 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 326-345 (2018). MSC: 68M11 68M25 91A65 91A80 PDFBibTeX XMLCite \textit{S. Sengupta} et al., Lect. Notes Comput. Sci. 11199, 326--345 (2018; Zbl 1519.68011) Full Text: DOI
Wachter, Jasmin; Rass, Stefan; König, Sandra; Schauer, Stefan Disappointment-aversion in security games. (English) Zbl 1521.91010 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 314-325 (2018). MSC: 91A10 91A20 68M25 PDFBibTeX XMLCite \textit{J. Wachter} et al., Lect. Notes Comput. Sci. 11199, 314--325 (2018; Zbl 1521.91010) Full Text: DOI
Kiumarsi, Bahare; Başar, Tamer Distributed aggregative games on graphs in adversarial environments. (English) Zbl 1521.91049 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 296-313 (2018). MSC: 91A43 05C57 68M25 PDFBibTeX XMLCite \textit{B. Kiumarsi} and \textit{T. Başar}, Lect. Notes Comput. Sci. 11199, 296--313 (2018; Zbl 1521.91049) Full Text: DOI
Huang, Linan; Zhu, Quanyan Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems. (English) Zbl 1519.68028 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 205-226 (2018). MSC: 68M25 91A80 PDFBibTeX XMLCite \textit{L. Huang} and \textit{Q. Zhu}, Lect. Notes Comput. Sci. 11199, 205--226 (2018; Zbl 1519.68028) Full Text: DOI
Ma, Yuzhe; Jun, Kwang-Sung; Li, Lihong; Zhu, Xiaojin Data poisoning attacks in contextual bandits. (English) Zbl 1519.68029 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 186-204 (2018). MSC: 68M25 68T05 90C90 PDFBibTeX XMLCite \textit{Y. Ma} et al., Lect. Notes Comput. Sci. 11199, 186--204 (2018; Zbl 1519.68029) Full Text: DOI arXiv
Bilinski, Mark; Gabrys, Ryan; Mauger, Justin Optimal placement of honeypots for network defense. (English) Zbl 1519.68024 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 115-126 (2018). MSC: 68M25 91A80 PDFBibTeX XMLCite \textit{M. Bilinski} et al., Lect. Notes Comput. Sci. 11199, 115--126 (2018; Zbl 1519.68024) Full Text: DOI
Moothedath, Shana; Sahabandu, Dinuka; Clark, Andrew; Lee, Sangho; Lee, Wenke; Poovendran, Radha Multi-stage dynamic information flow tracking game. (English) Zbl 1519.68030 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 80-101 (2018). MSC: 68M25 91A80 PDFBibTeX XMLCite \textit{S. Moothedath} et al., Lect. Notes Comput. Sci. 11199, 80--101 (2018; Zbl 1519.68030) Full Text: DOI
Krawec, Walter O.; Miao, Fei Game theoretic security framework for quantum key distribution. (English) Zbl 07721026 Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 38-58 (2018). MSC: 81P94 91A80 68M25 81P70 PDFBibTeX XMLCite \textit{W. O. Krawec} and \textit{F. Miao}, Lect. Notes Comput. Sci. 11199, 38--58 (2018; Zbl 07721026) Full Text: DOI
Uzunkol, Osmanbey; Rangasamy, Jothi; Kuppusamy, Lakshmi Hide the modulus: a secure non-interactive fully verifiable delegation scheme for modular exponentiations via CRT. (English) Zbl 1517.94160 Chen, Liqun (ed.) et al., Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11060, 250-267 (2018). MSC: 94A60 68M11 PDFBibTeX XMLCite \textit{O. Uzunkol} et al., Lect. Notes Comput. Sci. 11060, 250--267 (2018; Zbl 1517.94160) Full Text: DOI
Sumongkayothin, Karin M-ORAM revisited: security and construction updates. (English) Zbl 1515.68089 Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 521-532 (2018). MSC: 68M25 68P20 PDFBibTeX XMLCite \textit{K. Sumongkayothin}, Lect. Notes Comput. Sci. 11125, 521--532 (2018; Zbl 1515.68089) Full Text: DOI
Hirose, Shoichi; Shikata, Junji Non-adaptive group-testing aggregate MAC scheme. (English) Zbl 1518.94114 Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 357-372 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Hirose} and \textit{J. Shikata}, Lect. Notes Comput. Sci. 11125, 357--372 (2018; Zbl 1518.94114) Full Text: DOI
Guo, Jingjing; Wang, Jianfeng; Zhang, Zhiwei; Chen, Xiaofeng An almost non-interactive order preserving encryption scheme. (English) Zbl 1515.68116 Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 87-100 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Guo} et al., Lect. Notes Comput. Sci. 11125, 87--100 (2018; Zbl 1515.68116) Full Text: DOI
Suzuki, Tatsuya; Emura, Keita; Ohigashi, Toshihiro A generic construction of integrated secure-channel free PEKS and PKE. (English) Zbl 1515.68123 Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 69-86 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{T. Suzuki} et al., Lect. Notes Comput. Sci. 11125, 69--86 (2018; Zbl 1515.68123) Full Text: DOI
Naito, Yusuke On the efficiency of ZMAC-type modes. (English) Zbl 1518.94083 Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 190-210 (2018). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{Y. Naito}, Lect. Notes Comput. Sci. 11124, 190--210 (2018; Zbl 1518.94083) Full Text: DOI
Pagnin, Elena; Brunetta, Carlo; Picazo-Sanchez, Pablo \(\mathsf{HIKE}\): walking the privacy trail. (English) Zbl 1515.68127 Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 43-66 (2018). MSC: 68P27 68P25 PDFBibTeX XMLCite \textit{E. Pagnin} et al., Lect. Notes Comput. Sci. 11124, 43--66 (2018; Zbl 1515.68127) Full Text: DOI
Zhu, Qingyi; Li, Longqi; Gan, Chenquan Modeling and analysis of the impact of adaptive defense strategy on virus spreading. (English) Zbl 1512.68053 IAENG, Int. J. Appl. Math. 48, No. 2, 146-151 (2018). MSC: 68M25 68M11 68M12 PDFBibTeX XMLCite \textit{Q. Zhu} et al., IAENG, Int. J. Appl. Math. 48, No. 2, 146--151 (2018; Zbl 1512.68053)
Zhu, Guang; Liu, Hu; Feng, Mining Sustainability of information security investment in online social networks: an evolutionary game-theoretic approach. (English) Zbl 1515.91131 Mathematics 6, No. 10, Paper No. 177, 19 p. (2018). MSC: 91D30 91A22 PDFBibTeX XMLCite \textit{G. Zhu} et al., Mathematics 6, No. 10, Paper No. 177, 19 p. (2018; Zbl 1515.91131) Full Text: DOI
Zhang, Jun; Gao, Pengfei; Song, Fu; Wang, Chao SCInfer: refinement-based verification of software countermeasures against side-channel attacks. (English) Zbl 1511.68173 Chockler, Hana (ed.) et al., Computer aided verification. 30th international conference, CAV 2018, held as part of the federated logic conference, FloC 2018, Oxford, UK, July 14–17, 2018. Proceedings. Part II. Cham: Springer Open. Lect. Notes Comput. Sci. 10982, 157-177 (2018). MSC: 68Q60 68M25 94A60 PDFBibTeX XMLCite \textit{J. Zhang} et al., Lect. Notes Comput. Sci. 10982, 157--177 (2018; Zbl 1511.68173) Full Text: DOI
Bauer, Matthew S.; Chadha, Rohit; Prasad Sistla, A.; Viswanathan, Mahesh Model checking indistinguishability of randomized security protocols. (English) Zbl 1511.68148 Chockler, Hana (ed.) et al., Computer aided verification. 30th international conference, CAV 2018, held as part of the federated logic conference, FloC 2018, Oxford, UK, July 14–17, 2018. Proceedings. Part II. Cham: Springer Open. Lect. Notes Comput. Sci. 10982, 117-135 (2018). MSC: 68Q60 68M25 68W20 94A60 PDFBibTeX XMLCite \textit{M. S. Bauer} et al., Lect. Notes Comput. Sci. 10982, 117--135 (2018; Zbl 1511.68148) Full Text: DOI
Asăvoae, Irina Măriuca; Nguyen, Hoang Nga; Roggenbach, Markus Software model checking for mobile security – collusion detection in \(\mathbb{K} \). (English) Zbl 1508.68214 del Mar Gallardo, María (ed.) et al., Model checking software. 25th international symposium, SPIN 2018, Malaga, Spain, June 20–22, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10869, 3-25 (2018). MSC: 68Q60 68N25 68Q55 PDFBibTeX XMLCite \textit{I. M. Asăvoae} et al., Lect. Notes Comput. Sci. 10869, 3--25 (2018; Zbl 1508.68214) Full Text: DOI
Nantes, Daniele; Pérez, Jorge A. Relating process languages for security and communication correctness (extended abstract). (English) Zbl 1508.68249 Baier, Christel (ed.) et al., Formal techniques for distributed objects, components, and systems. 38th IFIP WG 6.1 international conference, FORTE 2018, held as part of the 13th international federated conference on distributed computing techniques, DisCoTec 2018, Madrid, Spain, June 18–21, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10854, 79-100 (2018). MSC: 68Q85 68M25 PDFBibTeX XMLCite \textit{D. Nantes} and \textit{J. A. Pérez}, Lect. Notes Comput. Sci. 10854, 79--100 (2018; Zbl 1508.68249) Full Text: DOI
Logrippo, Luigi Multi-level access control, directed graphs and partial orders in flow control for data secrecy and privacy. (English) Zbl 1505.68003 Imine, Abdessamad (ed.) et al., Foundations and practice of security. 10th international symposium, FPS 2017, Nancy, France, October 23–25, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10723, 111-123 (2018). MSC: 68M25 68P27 PDFBibTeX XMLCite \textit{L. Logrippo}, Lect. Notes Comput. Sci. 10723, 111--123 (2018; Zbl 1505.68003) Full Text: DOI
Michalevsky, Yan; Joye, Marc Decentralized policy-hiding ABE with receiver privacy. (English) Zbl 1496.68072 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 548-567 (2018). MSC: 68M25 68P25 68P27 94A60 PDFBibTeX XMLCite \textit{Y. Michalevsky} and \textit{M. Joye}, Lect. Notes Comput. Sci. 11099, 548--567 (2018; Zbl 1496.68072) Full Text: DOI
Lai, Junzuo; Tang, Qiang Making any attribute-based encryption accountable, efficiently. (English) Zbl 1496.68068 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 527-547 (2018). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{J. Lai} and \textit{Q. Tang}, Lect. Notes Comput. Sci. 11099, 527--547 (2018; Zbl 1496.68068) Full Text: DOI
Gotfryd, Karol; Lorek, Paweł; Zagórski, Filip Rifflescrambler – a memory-hard password storing function. (English) Zbl 1496.68062 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 309-328 (2018). MSC: 68M25 94A60 PDFBibTeX XMLCite \textit{K. Gotfryd} et al., Lect. Notes Comput. Sci. 11099, 309--328 (2018; Zbl 1496.68062) Full Text: DOI arXiv
Libert, Benoît; Peters, Thomas; Qian, Chen Logarithmic-size ring signatures with tight security from the DDH assumption. (English) Zbl 1500.94073 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 288-308 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 11099, 288--308 (2018; Zbl 1500.94073) Full Text: DOI HAL
Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. (English) Zbl 1496.68076 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 228-246 (2018). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{C. Zuo} et al., Lect. Notes Comput. Sci. 11099, 228--246 (2018; Zbl 1496.68076) Full Text: DOI arXiv
Li, Jin; Ye, Heng; Wang, Wei; Lou, Wenjing; Hou, Y. Thomas; Liu, Jiqiang; Lu, Rongxing Efficient and secure outsourcing of differentially private data publication. (English) Zbl 1496.68070 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 187-206 (2018). MSC: 68M25 68P25 68P27 PDFBibTeX XMLCite \textit{J. Li} et al., Lect. Notes Comput. Sci. 11099, 187--206 (2018; Zbl 1496.68070) Full Text: DOI
Liu, Jianghua; Ma, Jinhua; Zhou, Wanlei; Xiang, Yang; Huang, Xinyi Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases. (English) Zbl 1496.68128 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 167-186 (2018). MSC: 68P15 68M25 68P27 PDFBibTeX XMLCite \textit{J. Liu} et al., Lect. Notes Comput. Sci. 11099, 167--186 (2018; Zbl 1496.68128) Full Text: DOI
Wang, Jianfeng; Chen, Xiaofeng; Sun, Shi-Feng; Liu, Joseph K.; Au, Man Ho; Zhan, Zhi-Hui Towards efficient verifiable conjunctive keyword search for large encrypted database. (English) Zbl 1496.68130 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 83-100 (2018). MSC: 68P15 68M25 68P25 PDFBibTeX XMLCite \textit{J. Wang} et al., Lect. Notes Comput. Sci. 11099, 83--100 (2018; Zbl 1496.68130) Full Text: DOI
Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie Efficiently deciding equivalence for standard primitives and phases. (English) Zbl 1496.68060 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 491-511 (2018). MSC: 68M25 68P27 94A60 PDFBibTeX XMLCite \textit{V. Cortier} et al., Lect. Notes Comput. Sci. 11098, 491--511 (2018; Zbl 1496.68060) Full Text: DOI HAL
Han, Jinguang; Chen, Liqun; Schneider, Steve; Treharne, Helen; Wesemeyer, Stephan Anonymous single-sign-on for \(n\) designated services with traceability. (English) Zbl 1496.68064 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 470-490 (2018). MSC: 68M25 68P27 94A62 PDFBibTeX XMLCite \textit{J. Han} et al., Lect. Notes Comput. Sci. 11098, 470--490 (2018; Zbl 1496.68064) Full Text: DOI arXiv
Hess, Andreas V.; Mödersheim, Sebastian A.; Brucker, Achim D. Stateful protocol composition. (English) Zbl 1496.68065 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 427-446 (2018). MSC: 68M25 94A60 PDFBibTeX XMLCite \textit{A. V. Hess} et al., Lect. Notes Comput. Sci. 11098, 427--446 (2018; Zbl 1496.68065) Full Text: DOI Link
Mauw, Sjouke; Smith, Zach; Toro-Pozo, Jorge; Trujillo-Rasua, Rolando Automated identification of desynchronisation attacks on shared secrets. (English) Zbl 1496.68071 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 406-426 (2018). MSC: 68M25 94A60 94A62 PDFBibTeX XMLCite \textit{S. Mauw} et al., Lect. Notes Comput. Sci. 11098, 406--426 (2018; Zbl 1496.68071) Full Text: DOI
Baelde, David; Delaune, Stéphanie; Hirschi, Lucca POR for security protocol equivalences. Beyond action-determinism. (English) Zbl 1496.68055 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 385-405 (2018). MSC: 68M25 94A60 PDFBibTeX XMLCite \textit{D. Baelde} et al., Lect. Notes Comput. Sci. 11098, 385--405 (2018; Zbl 1496.68055) Full Text: DOI arXiv
Keuffer, Julien; Molva, Refik; Chabanne, Hervé Efficient proof composition for verifiable computation. (English) Zbl 1496.68067 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 152-171 (2018). MSC: 68M25 68T05 94A60 PDFBibTeX XMLCite \textit{J. Keuffer} et al., Lect. Notes Comput. Sci. 11098, 152--171 (2018; Zbl 1496.68067) Full Text: DOI
Hosseini, Soodeh; Azgomi, Mohammad Abdollahi The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks. (English) Zbl 1514.68022 Physica A 512, 803-817 (2018). MSC: 68M25 34D05 68M10 PDFBibTeX XMLCite \textit{S. Hosseini} and \textit{M. A. Azgomi}, Physica A 512, 803--817 (2018; Zbl 1514.68022) Full Text: DOI
Long, Linbo; Zhong, Kan; Wang, Wei Malicious viruses spreading on complex networks with heterogeneous recovery rate. (English) Zbl 1514.68023 Physica A 509, 746-753 (2018). MSC: 68M25 05C82 68M10 PDFBibTeX XMLCite \textit{L. Long} et al., Physica A 509, 746--753 (2018; Zbl 1514.68023) Full Text: DOI
Zhang, Xulong; Gan, Chenquan Global attractivity and optimal dynamic countermeasure of a virus propagation model in complex networks. (English) Zbl 1514.68024 Physica A 490, 1004-1018 (2018). MSC: 68M25 05C82 34D20 68M10 PDFBibTeX XMLCite \textit{X. Zhang} and \textit{C. Gan}, Physica A 490, 1004--1018 (2018; Zbl 1514.68024) Full Text: DOI
Li, Ruinian; Xiao, Yinhao; Zhang, Cheng; Song, Tianyi; Hu, Chunqiang Cryptographic algorithms for privacy-preserving online applications. (English) Zbl 1486.68057 Math. Found. Comput. 1, No. 4, 311-330 (2018). MSC: 68P27 68Q10 94A60 94A62 PDFBibTeX XMLCite \textit{R. Li} et al., Math. Found. Comput. 1, No. 4, 311--330 (2018; Zbl 1486.68057) Full Text: DOI
Gingold, H.; Quaintance, Jocelyn Dictionary coding via perfect polynomials. (English) Zbl 1481.94157 J. Discrete Math. Sci. Cryptography 21, No. 7-8, 1537-1548 (2018). MSC: 94B25 41A10 68P25 PDFBibTeX XMLCite \textit{H. Gingold} and \textit{J. Quaintance}, J. Discrete Math. Sci. Cryptography 21, No. 7--8, 1537--1548 (2018; Zbl 1481.94157) Full Text: DOI
Zhou, Xianlin; Ye, Jun A new way to produce key streams based on chaotic sequences. (English) Zbl 1481.94075 J. Discrete Math. Sci. Cryptography 21, No. 5, 1097-1105 (2018). MSC: 94A29 68P30 PDFBibTeX XMLCite \textit{X. Zhou} and \textit{J. Ye}, J. Discrete Math. Sci. Cryptography 21, No. 5, 1097--1105 (2018; Zbl 1481.94075) Full Text: DOI
Gingold, H.; Quaintance, Jocelyn Dictionary based codes involving power product expansions. (English) Zbl 1481.94103 J. Discrete Math. Sci. Cryptography 21, No. 5, 1031-1054 (2018). MSC: 94A60 11T71 68P25 PDFBibTeX XMLCite \textit{H. Gingold} and \textit{J. Quaintance}, J. Discrete Math. Sci. Cryptography 21, No. 5, 1031--1054 (2018; Zbl 1481.94103) Full Text: DOI
Styugin, M. A.; Kytmanov, A. A.; Yamskikh, T. N. Formalization of the problem of protection against reconnaissance in conflict systems. (English) Zbl 1481.94123 J. Discrete Math. Sci. Cryptography 21, No. 3, 679-694 (2018). MSC: 94A60 90C35 PDFBibTeX XMLCite \textit{M. A. Styugin} et al., J. Discrete Math. Sci. Cryptography 21, No. 3, 679--694 (2018; Zbl 1481.94123) Full Text: DOI Link
Gingold, H.; Quaintance, Jocelyn Complexity analysis of a top down algorithm motivated by power product expansions. (English) Zbl 1481.94102 J. Discrete Math. Sci. Cryptography 21, No. 1, 113-151 (2018). MSC: 94A60 11T71 11Y16 11Y50 68W40 PDFBibTeX XMLCite \textit{H. Gingold} and \textit{J. Quaintance}, J. Discrete Math. Sci. Cryptography 21, No. 1, 113--151 (2018; Zbl 1481.94102) Full Text: DOI
King, Valerie; Pettie, Seth; Saia, Jared; Young, Maxwell A resource-competitive jamming defense. (English) Zbl 1482.68048 Distrib. Comput. 31, No. 6, 419-439 (2018). MSC: 68M10 68M12 68M18 68W40 94A40 PDFBibTeX XMLCite \textit{V. King} et al., Distrib. Comput. 31, No. 6, 419--439 (2018; Zbl 1482.68048) Full Text: DOI arXiv
Ahmetzyanova, L. R.; Alekseev, E. K.; Karpunin, G. A.; Smyshlyaev, S. V. On cryptographic properties of the \(CVV\) and \(PVV\) parameters generation procedures in payment systems. (English) Zbl 1475.94091 Mat. Vopr. Kriptografii 9, No. 2, 23-46 (2018). MSC: 94A60 91B64 68P25 PDFBibTeX XMLCite \textit{L. R. Ahmetzyanova} et al., Mat. Vopr. Kriptografii 9, No. 2, 23--46 (2018; Zbl 1475.94091) Full Text: DOI MNR
Patel, Sarvar; Persiano, Giuseppe; Yeo, Kevin CacheShuffle: a family of oblivious shuffles. (English) Zbl 1499.68055 Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 161, 13 p. (2018). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{S. Patel} et al., LIPIcs -- Leibniz Int. Proc. Inform. 107, Article 161, 13 p. (2018; Zbl 1499.68055) Full Text: DOI
Ando, Megumi; Lysyanskaya, Anna; Upfal, Eli Practical and provably secure onion routing. (English) Zbl 1499.68044 Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 144, 14 p. (2018). MSC: 68M25 68M12 68P27 PDFBibTeX XMLCite \textit{M. Ando} et al., LIPIcs -- Leibniz Int. Proc. Inform. 107, Article 144, 14 p. (2018; Zbl 1499.68044) Full Text: DOI arXiv
Delaune, Stéphanie Analysing privacy-type properties in cryptographic protocols (invited talk). (English) Zbl 1462.68017 Kirchner, Hélène (ed.), 3rd international conference on formal structures for computation and deduction, FSCD 2018, July 9–12, 2018, Oxford, United Kingdom. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 108, Article 1, 21 p. (2018). MSC: 68M25 68M12 68Q60 94A60 PDFBibTeX XMLCite \textit{S. Delaune}, LIPIcs -- Leibniz Int. Proc. Inform. 108, Article 1, 21 p. (2018; Zbl 1462.68017) Full Text: DOI
Cortesi, Agostino; Ferrara, Pietro; Halder, Raju; Zanioli, Matteo Combining symbolic and numerical domains for information leakage analysis. (English) Zbl 1461.68054 Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science XXXI. Special issue on signal processing and security in distributed systems. Berlin: Springer. Lect. Notes Comput. Sci. 10730, 98-135 (2018). MSC: 68N30 68M25 68P15 PDFBibTeX XMLCite \textit{A. Cortesi} et al., Lect. Notes Comput. Sci. 10730, 98--135 (2018; Zbl 1461.68054) Full Text: DOI Link
Bianchi, Alessandro; Pizzutilo, Sebastiano; Vessio, Gennaro Intercepting blackhole attacks in MANETs: an ASM-based model. (English) Zbl 1461.68047 Cerone, Antonio (ed.) et al., Software engineering and formal methods. SEFM 2017 collocated workshops: DataMod, FAACS, MSE, CoSim-CPS, and FOCLASA, Trento, Italy, September 4–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10729, 137-152 (2018). MSC: 68M25 68M12 PDFBibTeX XMLCite \textit{A. Bianchi} et al., Lect. Notes Comput. Sci. 10729, 137--152 (2018; Zbl 1461.68047) Full Text: DOI
Américo, Arthur; Alvim, Mário S.; McIver, Annabelle An algebraic approach for reasoning about information flow. (English) Zbl 1460.68035 Havelund, Klaus (ed.) et al., Formal methods. 22nd international symposium, FM 2018, held as part of the federated logic conference, FloC 2018, Oxford, UK, July 15–17, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10951, 55-72 (2018). MSC: 68P30 68M25 68Q60 PDFBibTeX XMLCite \textit{A. Américo} et al., Lect. Notes Comput. Sci. 10951, 55--72 (2018; Zbl 1460.68035) Full Text: DOI arXiv
Blocki, Jeremiah; Zhou, Samson On the computational complexity of minimal cumulative cost graph pebbling. (English) Zbl 1460.68044 Meiklejohn, Sarah (ed.) et al., Financial cryptography and data security. 22nd international conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 10957, 329-346 (2018). MSC: 68Q25 68M25 68Q17 68R10 94A60 PDFBibTeX XMLCite \textit{J. Blocki} and \textit{S. Zhou}, Lect. Notes Comput. Sci. 10957, 329--346 (2018; Zbl 1460.68044) Full Text: DOI arXiv
Das, Sanchari; Dingman, Andrew; Camp, L. Jean Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key. (English) Zbl 1460.94071 Meiklejohn, Sarah (ed.) et al., Financial cryptography and data security. 22nd international conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 10957, 160-179 (2018). MSC: 94A62 PDFBibTeX XMLCite \textit{S. Das} et al., Lect. Notes Comput. Sci. 10957, 160--179 (2018; Zbl 1460.94071) Full Text: DOI
Gaĭdamakin, N. A. Multilevel thematic-hierarchical access control (MLTHS-system). (Russian. English summary) Zbl 1515.68110 Prikl. Diskretn. Mat. 2018, No. 39, 42-57 (2018). MSC: 68P15 68M25 68P20 PDFBibTeX XMLCite \textit{N. A. Gaĭdamakin}, Prikl. Diskretn. Mat. 2018, No. 39, 42--57 (2018; Zbl 1515.68110) Full Text: DOI MNR
Agievich, S. V. EHE: nonce misuse-resistant message authentication. (English) Zbl 1462.94051 Prikl. Diskretn. Mat. 2018, No. 39, 33-41 (2018). MSC: 94A62 PDFBibTeX XMLCite \textit{S. V. Agievich}, Prikl. Diskretn. Mat. 2018, No. 39, 33--41 (2018; Zbl 1462.94051) Full Text: DOI MNR
Wang, Ping; Zhang, Zijian; Wang, Ding Revisiting anonymous two-factor authentication schemes for multi-server environment. (English) Zbl 1458.94316 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 805-816 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{P. Wang} et al., Lect. Notes Comput. Sci. 11149, 805--816 (2018; Zbl 1458.94316) Full Text: DOI
Ji, Xiaoshu; Le Guernic, Gurvan; Cuppens-Boulahia, Nora; Cuppens, Frédéric USB packets filtering policies and an associated low-cost simulation framework. (English) Zbl 1461.93504 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 732-742 (2018). MSC: 93E11 94C99 PDFBibTeX XMLCite \textit{X. Ji} et al., Lect. Notes Comput. Sci. 11149, 732--742 (2018; Zbl 1461.93504) Full Text: DOI
Kopp, Henning; Kargl, Frank; Bösch, Christoph Publicly verifiable static proofs of storage: a novel scheme and efficiency comparisons. (English) Zbl 1458.94252 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 459-477 (2018). MSC: 94A60 68M11 PDFBibTeX XMLCite \textit{H. Kopp} et al., Lect. Notes Comput. Sci. 11149, 459--477 (2018; Zbl 1458.94252) Full Text: DOI
Zhang, Rui; Tao, Yang Key dependent message security for revocable identity-based encryption and identity-based encryption. (English) Zbl 1458.94289 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 426-441 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Zhang} and \textit{Y. Tao}, Lect. Notes Comput. Sci. 11149, 426--441 (2018; Zbl 1458.94289) Full Text: DOI
Xu, Jian; Yun, Xiaochun; Zhang, Yongzheng; Cheng, Zhenyu Community discovery of attribution trace based on deep learning approach. (English) Zbl 1497.68081 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 342-357 (2018). MSC: 68M25 62H30 68M10 68T07 PDFBibTeX XMLCite \textit{J. Xu} et al., Lect. Notes Comput. Sci. 11149, 342--357 (2018; Zbl 1497.68081) Full Text: DOI
Breuer, Peter T.; Bowen, Jonathan P.; Palomar, Esther; Liu, Zhiming On security in encrypted computing. (English) Zbl 1497.68074 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 192-211 (2018). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{P. T. Breuer} et al., Lect. Notes Comput. Sci. 11149, 192--211 (2018; Zbl 1497.68074) Full Text: DOI
Teşeleanu, George Random number generators can be fooled to behave badly. (English) Zbl 1508.68031 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 124-141 (2018). MSC: 68M25 62F03 94A60 PDFBibTeX XMLCite \textit{G. Teşeleanu}, Lect. Notes Comput. Sci. 11149, 124--141 (2018; Zbl 1508.68031) Full Text: DOI
Tang, Dan; Dai, Rui; Tang, Liu; Zhan, Sijia; Man, Jianping Low-rate DoS attack detection based on two-step cluster analysis. (English) Zbl 1497.68080 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 92-104 (2018). MSC: 68M25 PDFBibTeX XMLCite \textit{D. Tang} et al., Lect. Notes Comput. Sci. 11149, 92--104 (2018; Zbl 1497.68080) Full Text: DOI
Niu, Xu-Feng; Zhang, Jian-Zhong; Xie, Shu-Cui; Chen, Bu-Qing A practical E-payment protocol based on quantum multi-proxy blind signature. (English) Zbl 1451.81216 Commun. Theor. Phys. 70, No. 5, 529-533 (2018). MSC: 81P94 91G45 PDFBibTeX XMLCite \textit{X.-F. Niu} et al., Commun. Theor. Phys. 70, No. 5, 529--533 (2018; Zbl 1451.81216) Full Text: DOI
Külekci, M. Oguzhan An ambiguous coding scheme for selective encryption of high entropy volumes. (English) Zbl 1493.68135 D’Angelo, Gianlorenzo (ed.), 17th symposium on experimental algorithms, SEA 2018, June 27–29, 2018, L’Aquila, Italy. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 103, Article 7, 13 p. (2018). MSC: 68P25 68P30 PDFBibTeX XMLCite \textit{M. O. Külekci}, LIPIcs -- Leibniz Int. Proc. Inform. 103, Article 7, 13 p. (2018; Zbl 1493.68135) Full Text: DOI
Bérard, Béatrice; Haddad, Serge; Lefaucheux, Engel Probabilistic disclosure: maximisation vs. minimisation. (English) Zbl 1491.68106 Lokam, Satya (ed.) et al., 37th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2017, IIT Kanpur, India, December 12–14, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 93, Article 13, 14 p. (2018). MSC: 68Q60 68M25 68Q87 90C40 PDFBibTeX XMLCite \textit{B. Bérard} et al., LIPIcs -- Leibniz Int. Proc. Inform. 93, Article 13, 14 p. (2018; Zbl 1491.68106) Full Text: DOI
Vaikuntanathan, Vinod Some open problems in information-theoretic cryptography. (English) Zbl 1493.94044 Lokam, Satya (ed.) et al., 37th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2017, IIT Kanpur, India, December 12–14, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 93, Article 5, 7 p. (2018). MSC: 94A60 94A15 94A62 68P25 68P20 PDFBibTeX XMLCite \textit{V. Vaikuntanathan}, LIPIcs -- Leibniz Int. Proc. Inform. 93, Article 5, 7 p. (2018; Zbl 1493.94044) Full Text: DOI
Hernández Guillén, J. D.; Martín del Rey, A. Modeling malware propagation using a carrier compartment. (English) Zbl 1510.68010 Commun. Nonlinear Sci. Numer. Simul. 56, 217-226 (2018). MSC: 68M11 34C60 34D20 34D23 68M14 68M25 PDFBibTeX XMLCite \textit{J. D. Hernández Guillén} and \textit{A. Martín del Rey}, Commun. Nonlinear Sci. Numer. Simul. 56, 217--226 (2018; Zbl 1510.68010) Full Text: DOI
Ahmadian Ramaki, Ali; Rasoolzadegan, Abbas; Javan Jafari, Abbas A systematic review on intrusion detection based on the hidden Markov model. (English) Zbl 07260735 Stat. Anal. Data Min. 11, No. 3, 111-134 (2018). MSC: 62-XX 68-XX PDFBibTeX XMLCite \textit{A. Ahmadian Ramaki} et al., Stat. Anal. Data Min. 11, No. 3, 111--134 (2018; Zbl 07260735) Full Text: DOI
Liu, Yi; Luo, Yu; Zhu, Youwen; Liu, Yang; Li, Xingxin Secure multi-label data classification in cloud by additionally homomorphic encryption. (English) Zbl 1441.68209 Inf. Sci. 468, 89-102 (2018). MSC: 68T05 62H30 68P25 PDFBibTeX XMLCite \textit{Y. Liu} et al., Inf. Sci. 468, 89--102 (2018; Zbl 1441.68209) Full Text: DOI
Yu, Jia; Hao, Rong; Xia, Hui; Zhang, Hanlin; Cheng, Xiangguo; Kong, Fanyu Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction. (English) Zbl 1440.94104 Inf. Sci. 442-443, 158-172 (2018). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Yu} et al., Inf. Sci. 442--443, 158--172 (2018; Zbl 1440.94104) Full Text: DOI
Wang, Baocang; Lei, Hao; Hu, Yupu D-NTRU: more efficient and average-case IND-CPA secure NTRU variant. (English) Zbl 1440.94083 Inf. Sci. 438, 15-31 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Wang} et al., Inf. Sci. 438, 15--31 (2018; Zbl 1440.94083) Full Text: DOI
Wu, Hao; Wang, Wei; Wen, Changyun; Li, Zhengguo Game theoretical security detection strategy for networked systems. (English) Zbl 1448.91032 Inf. Sci. 453, 346-363 (2018). MSC: 91A20 91A27 91A80 93B70 PDFBibTeX XMLCite \textit{H. Wu} et al., Inf. Sci. 453, 346--363 (2018; Zbl 1448.91032) Full Text: DOI
Ao, Wei; Song, Yongdong; Wen, Changyun; Lai, Junfeng Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries. (English) Zbl 1448.93222 Inf. Sci. 451-452, 67-82 (2018). MSC: 93C83 93B70 93B07 68M25 PDFBibTeX XMLCite \textit{W. Ao} et al., Inf. Sci. 451--452, 67--82 (2018; Zbl 1448.93222) Full Text: DOI
Karati, Arijit; Islam, Sk Hafizul; Biswas, G. P. A pairing-free and provably secure certificateless signature scheme. (English) Zbl 1440.94096 Inf. Sci. 450, 378-391 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{A. Karati} et al., Inf. Sci. 450, 378--391 (2018; Zbl 1440.94096) Full Text: DOI
Zhang, Yong The unified image encryption algorithm based on chaos and cubic S-box. (English) Zbl 1440.94085 Inf. Sci. 450, 361-377 (2018). MSC: 94A60 68P25 68U10 PDFBibTeX XMLCite \textit{Y. Zhang}, Inf. Sci. 450, 361--377 (2018; Zbl 1440.94085) Full Text: DOI
Yan, Zheng; Wang, Pu; Feng, Wei A novel scheme of anonymous authentication on trust in pervasive social networking. (English) Zbl 1440.94103 Inf. Sci. 445-446, 79-96 (2018). MSC: 94A62 68P27 91D30 PDFBibTeX XMLCite \textit{Z. Yan} et al., Inf. Sci. 445--446, 79--96 (2018; Zbl 1440.94103) Full Text: DOI Link
Li, Jiguo; Chen, Liqing; Lu, Yang; Zhang, Yichen Anonymous certificate-based broadcast encryption with constant decryption cost. (English) Zbl 1440.94065 Inf. Sci. 454-455, 110-127 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Li} et al., Inf. Sci. 454--455, 110--127 (2018; Zbl 1440.94065) Full Text: DOI
Oh, Hyunok; Kim, Jihye; Shin, Ji Sun Forward-secure ID based digital signature scheme with forward-secure private key generator. (English) Zbl 1440.94073 Inf. Sci. 454-455, 96-109 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{H. Oh} et al., Inf. Sci. 454--455, 96--109 (2018; Zbl 1440.94073) Full Text: DOI
Bagchi, Aniruddha; Bandyopadhyay, Tridib Role of intelligence inputs in defending against cyber warfare and cyberterrorism. (English) Zbl 1511.68041 Decis. Anal. 15, No. 3, 174-193 (2018). MSC: 68M25 91A80 PDFBibTeX XMLCite \textit{A. Bagchi} and \textit{T. Bandyopadhyay}, Decis. Anal. 15, No. 3, 174--193 (2018; Zbl 1511.68041) Full Text: DOI
Mai, Bin; Kulkarni, Shailesh When hackers err: the impacts of false positives on information security games. (English) Zbl 1515.91020 Decis. Anal. 15, No. 2, 90-109 (2018). MSC: 91A10 91A80 PDFBibTeX XMLCite \textit{B. Mai} and \textit{S. Kulkarni}, Decis. Anal. 15, No. 2, 90--109 (2018; Zbl 1515.91020) Full Text: DOI Link
Yang, Jing; Wang, Liming; Xu, Zhen A novel semantic-aware approach for detecting malicious web traffic. (English) Zbl 1452.94109 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 633-645 (2018). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Yang} et al., Lect. Notes Comput. Sci. 10631, 633--645 (2018; Zbl 1452.94109) Full Text: DOI
Sharma, Gaurav; Sahu, Rajeev Anand; Kuchta, Veronika; Markowitch, Olivier; Bala, Suman Authenticated group key agreement protocol without pairing. (English) Zbl 1450.94044 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 606-618 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{G. Sharma} et al., Lect. Notes Comput. Sci. 10631, 606--618 (2018; Zbl 1450.94044) Full Text: DOI
Yoneyama, Kazuki; Kimura, Shogo Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency. (English) Zbl 1437.68055 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 489-501 (2018). MSC: 68P25 68P15 68P20 PDFBibTeX XMLCite \textit{K. Yoneyama} and \textit{S. Kimura}, Lect. Notes Comput. Sci. 10631, 489--501 (2018; Zbl 1437.68055) Full Text: DOI