default search action
1st FCS 2018: Chengdu, China
- Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang:
Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings. Communications in Computer and Information Science 879, Springer 2018, ISBN 978-981-13-3094-0
Invited Paper
- Sherman S. M. Chow:
Privacy-Preserving Machine Learning. 3-6
Symmetric Key Cryptography
- Chenhuang Wu, Chunxiang Xu:
On k-error Linear Complexity of Zeng-Cai-Tang-Yang Generalized Cyclotomic Binary Sequences of Period p2. 9-22 - Lihua Dong, Jie Wang, Shuo Zhang:
Novel Analysis of Stream Cipher Combing LFSR and FCSR. 23-38
Public Key Cryptography
- Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao:
Heterogeneous Deniable Authentication for E-Voting Systems. 41-54 - Kashi Neupane:
One-Round Authenticated Group Key Establishment Using Multilinear Maps. 55-65 - Pengfei Liang, Leyou Zhang, Yujie Shang:
Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption. 66-80
Post-quantum Cryptography
- Yanhua Zhang, Yong Gan, Yifeng Yin, Huiwen Jia, Mingming Jiang:
Efficient Lattice FIBS for Identities in a Small Universe. 83-95 - Zilong Wang, Honggang Hu:
Efficient KEA-Style Lattice-Based Authenticated Key Exchange. 96-109 - Jinqiu Hou, Mingming Jiang, Yuyan Guo, Wangan Song:
Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model. 110-118
Cloud Security and Data Deduplication
- Jining Zhao, Chunxiang Xu, Kefei Chen:
Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. 121-137 - Peng Zhang, Juntao Gao, Wenjuan Jia, Xuelian Li:
Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security. 138-152 - Charles R. Haruna, Mengshu Hou, Moses Jojo Eghan, Michael Y. Kpiebaareh, Lawrence Tandoh:
A Hybrid Data Deduplication Approach in Entity Resolution Using Chromatic Correlation Clustering. 153-167 - Hua Ma, Guohua Tian, Zhenhua Liu, Linchao Zhang:
Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage. 168-176
Access Control
- Yanyan Han, Guohao Li, Binbin Feng:
An SDN-Based Wireless Authentication and Access Control Security Solution. 179-189 - Zhaoqi Li, Yuyang Zhou:
Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks. 190-198
Attack and Behavior Detection
- Juan Wang, Haoxi Zhang, Fei Li, Zuli Wang, Jun Zhao:
Intelligent Vehicle Knowledge Representation and Anomaly Detection Using Neural Knowledge DNA. 201-215 - Xiaofei Wang, Longcheng Yang, Jun Hu, Hao Dai:
A Violent Behavior Detection Algorithm Combining Streakline Model with Variational Model. 216-224
System and Network Security
- Danni Wang, Juntao Gao, Haiyong Yu, Xuelian Li:
A Novel Digital Rights Management in P2P Networks Based on Bitcoin System. 227-240 - Lin Li, Mingyu Fan, Guangwei Wang:
LWSQR: Lightweight Secure QR Code. 241-255 - Yong Wang, Abdelrhman Hassan, Xiaoran Duan, Xiaodong Yang, Yiquan Zhang, Xiaosong Zhang:
An Authentication Approach for Multiple-User Location-Based Queries. 256-270
Security Design
- Rui Jin, Yidong Yuan, Ruishan Xin, Jie Gan, Xiaobo Hu, Yanyan Yu, Na Li, Yiqiang Zhao:
Active Shield Design for Security Chip in Smart Grid. 273-281 - Ning Yang, Yueyu Zhang:
A Radio Frequency Fingerprint Extraction Method Based on Cluster Center Difference. 282-298
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.