Accepted Papers
Paper ID | Authors | Paper Title |
---|---|---|
10 | Hiroki Okada, Shinsaku Kiyomoto, and Carlos Cid | Integerwise Functional Bootstrapping on TFHE |
12 | Masahito Ishizaka and Shinsaku Kiyomoto | Time-Specific Signatures |
19 | Ryoma Ito | Rotational Cryptanalysis of Salsa Core Function |
20 | Kai Chih Chang, Razieh Nokhbeh Zaeem and K. Suzanne Barber | A Framework for Estimating Privacy Risk Scores of Mobile Apps |
23 | Youle Xu and Qichun Wang | Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance |
26 | Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun and Jingzi Meng | Evaluation on the Security of Commercial Cloud Container Services |
28 | Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong and Jinwen Zheng | Anonymous IBE From Quadratic Residuosity With Fast Encryption |
30 | Ge Cheng, Hui Xie and Dongliang Zhang | Analyzing the Chain of Trust Model Based on Entity Dependence |
41 | Don Kuzhiyelil, Philipp Zieris, Marine Kadar, Sergey Tverdyshev and Gerhard Fohler | Towards Transparent Control-Flow Integrity in Safety-Critical Systems |
47 | Haoyu Ma, Tian Jianwen, Debin Gao and Chunfu Jia | Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel |
48 | Alberto Blanco-Justicia and Josep Domingo-Ferrer | Privacy-Preserving Computation of the Earth Mover’s Distance |
52 | Saihua Cai, Jinfu Chen, Xinru Li and Bo Liu | Minimal rare-pattern-based outlier detection method for data streams by considering anti-monotonic constraints |
57 | Zuchao Ma, Liang Liu and Weizhi Meng | ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks |
59 | Jamie Pont, Budi Arief and Julio Hernandez-Castro | Why Current Statistical Approaches to Ransomware Detection Fail |
61 | Rouzbeh Behnia, Attila A Yavuz, Muslum Ozgur Ozmen and Tsz Hon Yuen | Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT |
65 | Pier Paolo Tricomi and Mauro Conti | PvP: Profiling versus Player! Exploiting Gaming Data for Player Recognition |
69 | Abba Garba, Arne Bochem, and Benjamin Leiding | BlockVoke-Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust |
71 | Xiaoqi Li, Ting Chen, Xiapu Luo and Jiangshan Yu | Characterizing Erasable Accounts in Ethereum |
73 | Soma Murata, Daiki Miyahara, Takaaki Mizuki and Hideaki Sone | Public-PEZ Cryptography |
76 | Xin Chen and Liang Feng Zhang | Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials |
77 | Jorge Sanz Maroto, Haoyu Liu and Paul Patras | On the Struggle Bus: A Detailed Security Analysis of the m-tickets App |
81 | Rujia Li, Qin Wang, Feng Liu, Qi Wang and David Galindo | An Accountable Decryption System Based on Privacy-Preserving Smart Contracts |
82 | Junming Ke, Pawel Szalachowski, Jianying Zhou and Qiuliang Xu | Formalizing Bitcoin Crashes with Universally Composable Security |