default search action
8th SocialSec 2022: Xi'an, China
- Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski:
Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings. Communications in Computer and Information Science 1663, Springer 2022, ISBN 978-981-19-7241-6
Cryptography and its Applications
- Yaodong Zhang, Feng Liu:
Improved (t, n)-Threshold Proxy Signature Scheme. 3-14 - Yifei Wang, Yuliang Lin, Yi Wang, Wei Peng, Lin Liu:
Algorithm Substitution Attacks on Identity-Based Encryption. 15-31 - Yetneberk Zenebe Melesew, Jiayi Li, Yinbin Miao:
Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects. 32-51 - Tao Zhang, Chen Wang, Mulmediyage Imantha Udana Chandrasena:
Efficient Attribute-Based Proxy Re-encryption for Secure Deduplication. 52-64 - Mingwu Zhang, Zhen-An Li, Peihang Zhang:
A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption. 65-82 - Qingru Ma, Tianqi Zhou, Haowen Tan:
D2D Authentication Scheme for IoT-enabled Smart Home. 83-93 - Niao Yang, Shaojun Yang, Yong Zhao, Wei Wu:
Inner Product Encryption from Middle-Product Learning with Errors. 94-113
Network Security and Privacy Protection
- Yuting Jiang, Jianghong Wei, Jing Pan:
Publicly Verifiable Private Set Intersection from Homomorphic Encryption. 117-137 - Dayu Cao, Yinghui Zhang, Wei Liu, Xuanni Wei:
Secure Asynchronous Federated Learning for Edge Computing Devices. 138-147 - Mengfan Xu, Xinghua Li:
FedBC: An Efficient and Privacy-Preserving Federated Consensus Scheme. 148-162 - Yuxiang Zhou, Haowen Tan, Karunarathina Chandrathilaka Appuhamilage Asiria Iroshan:
A Secure and Privacy-Preserving Authentication Scheme in IoMT. 163-174 - Zehao Li, Guohua Tian, Shichong Tan:
Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication. 175-198 - Dongmei Zhao, Guoqing Ji, Shuiguang Zeng:
A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt. 199-211 - Mingwu Zhang, Chenmei Cui, Gang Shen, Yudi Zhang:
A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces. 212-226
Data Detection
- Tao Wang, Xiaoyu Zhang, Yulin Jin, Chenyang Chen, Fei Zhu:
Patch-Based Backdoors Detection and Mitigation with Feature Masking. 229-246 - Yan Xu, Yongming Liu, Jinxing Ma:
Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection. 247-263 - Chunmei Li, Lei Shang, Zheng Wei, Jun Ge, Mingyue Zhang, Yun Fang:
Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS. 264-280 - Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang:
A Defect Heterogeneous Risk Assessment Method with Misclassification Cost. 281-293 - Yingying Zhang, Hongyang Yan, Guanbiao Lin, Shiyu Peng, Zhenxin Zhang, Yufeng Wang:
Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks. 294-306
Blockchain and its Applications
- Zhuoran Zhang, Haibo Tian, Fangguo Zhang:
Improved WAVE Signature and Apply to Post-quantum Blockchain. 309-323 - Daling Shi, Chunjie Cao, Jun Ye:
Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption. 324-338 - Zhaoxing Jing, Chunjie Cao, Longjuan Wang, Yulian Sang:
Secure Data Storage Scheme of Judicial System Based on Blockchain. 339-350 - Hao Wu, Xiaoli Qin, Yuqing Kou:
Judicial Evidence Storage Scheme Based on Smart Contract. 351-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.