Abstract is missing.
- A Reinforced Dynamic Multi-keyword Ranked Search with Forward PrivacyChien-Ming Chen 0001, Zhuoyu Tie, Eric Ke Wang, Kuo-Hui Yeh, Wensheng Gan, SK Hafizul Islam. 1-8 [doi]
- Efficient Multi-Authority Attribute-based Signcryption with Constant-Size CiphertextYang Zhao, Ankang Ruan, Guohang Dan, Jicheng Huang, Yi Ding 0003. 1-8 [doi]
- Systematic Research on Technology and Challenges of Lightning NetworkZhixin Zhao, Lu Zhou 0002, Chunhua Su. 1-8 [doi]
- IoT ETEI: End-to-End IoT Device Identification MethodFeihong Yin, Li Yang, Yuchen Wang, Jiahao Dai. 1-8 [doi]
- Decentralized Data Aggregation: A New Secure Framework based on Lightweight Cryptographic AlgorithmsXin Xie, Yu-Chi Chen. 1-2 [doi]
- A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor NetworksYang Zhao, Guohang Dan, Ankang Ruan, Jicheng Huang, Hu Xiong. 1-7 [doi]
- On the Security of Permissionless Blockchain Systems: Challenges and Research PerspectiveHao Wang, Chunpeng Ge, Zhe Liu 0001. 1-8 [doi]
- A Provable Data Possession Protocol in Cloud Storage Systems with Fault ToleranceKui Zhu, Yongjun Ren, Qingfeng Zhu. 1-6 [doi]
- Phishing Site Detection Using Similarity of Website StructureShoma Tanaka, Takashi Matsunaka, Akira Yamada 0001, Ayumu Kubota. 1-8 [doi]
- Efficient Subset Predicate Encryption for Internet of ThingsYi-Fan Tseng, Shih-Jie Gao. 1-2 [doi]
- Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline ReplayYu Hsin Hung, Bing-Jhong Jheng, Hong-wei Li, Wen-Yang Lai, Sanoop Mallissery, Yu-Sung Wu. 1-8 [doi]
- Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face RecognitionHiroaki Kikuchi, Kazuki Eto, Kazushi Waki, Takafumi Mori. 1-7 [doi]
- Header-Translation based Flow Aggregation for Scattered Address Allocating SDNsRuisi Wu, Wen-Kang Jia, Xufang Wang. 1-8 [doi]
- Secure Outsourced Private Set Intersection with Linear ComplexitySumit Kumar Debnath, Kouchi Sakurai, Kunal Dey, Nibedita Kundu. 1-8 [doi]
- Partially Blind ECDSA Scheme and Its Application to BitcoinHongxun Huang, Zi-Yuan Liu, Raylin Tso. 1-8 [doi]
- A Novel Dynamic Group Signature with Membership PrivacyJunqing Lu, Rongxin Qi, Jian Shen. 1-5 [doi]
- EC-Model: An Evolvable Malware Classification ModelShan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen, Shiuhpyng Shieh. 1-8 [doi]
- Designated Verifier Signature Transformation: A New Framework for One-Time Delegating VerifiabilityJian-Feng Lin, Jun-Rui Wang, Che-Chia Chang, Yu-Chi Chen. 1-2 [doi]
- CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard ModelChun-I Fan, Yi-Fan Tseng, Cheng-Chun Feng. 1-8 [doi]
- Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party ScenarioShenghao Su, Cheng Guo, Pengxu Tian, Xinyu Tang. 1-7 [doi]
- An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart GridXueya Xia, Sai Ji. 1-2 [doi]
- A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social SystemsYalian Qian, Xueya Xia, Jian Shen. 1-5 [doi]
- A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature SpaceLyue Li, Amir Rezapour, Wen-Guey Tzeng. 1-7 [doi]
- Perpetual Secret Sharing from Dynamic Data StructuresShion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai. 1-8 [doi]
- A Patient-Centric Key Management Protocol for Healthcare Information System based on BlockchainTing-Le Zhu, Tzung-Her Chen. 1-5 [doi]
- On the Construction of a Post-Quantum BlockchainJiahui Chen, Wensheng Gan, Muchuang Hu, Chien-Ming Chen 0001. 1-8 [doi]
- Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary ExecutablesWei-Chieh Chao, Chung-Kuan Chen, Chen-Mou Cheng. 1-2 [doi]
- Arithmetic Coding for Floating-Point NumbersMarc Fischer, Oliver Riedel, Armin Lechler, Alexander Verl. 1-8 [doi]
- Efficient Blockchain-based IoT Firmware Update Considering Distribution IncentivesTatsuhiro Fukuda, Kazumasa Omote. 1-8 [doi]
- Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic UpdatingQian Mei, Hu Xiong, Yanan Zhao, Kuo-Hui Yeh. 1-8 [doi]
- Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime VerificationTieming Geng, Laurent Njilla, Chin-Tser Huang. 1-8 [doi]
- Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial CorrelationWenjuan Li 0001, Weizhi Meng 0001, Javier Parra-Arnau, Kim-Kwang Raymond Choo. 1-8 [doi]
- BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based CloudPhuc Trinh Dinh, Minho Park. 1-8 [doi]
- Generate Realistic Traffic Sign Image using Deep Convolutional Generative Adversarial NetworksYan-Ting Liu, Rung Ching Chen, Christine Dewi. 1-6 [doi]
- Retrieving Input from Touch Interfaces via Acoustic EmanationsKai Ren Teo, Balamurali B. T., Jer-Ming Chen, Jianying Zhou 0001. 1-8 [doi]
- A Distributed Ledger Management Mechanism for Storing and Selling Private DataSabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Pandu Rangan, Kouichi Sakurai. 1-8 [doi]
- Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud ComputingYuan Li, Haiyan Wang, Shulan Wang, Yong Ding. 1-8 [doi]
- Verifiable M+lst-Price Auction without ManagerPo-Chu Hsu, Atsuko Miyaji. 1-8 [doi]
- ExamChain: A Privacy-Preserving Onscreen Marking System based on Consortium BlockchainHaoyang An, Jiageng Chen. 1-8 [doi]
- A Novel Verification scheme for Resisting Password Guessing AttacksAlbert Guan, Chia-Mei Chen. 1-2 [doi]
- 2: Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5GRuei-Hau Hsu, Hsiang-Shian Fan, Lu-Chin Wang. 1-8 [doi]
- ChainPKI - Towards Ethash-based Decentralized PKI with Privacy EnhancementWei-Yang Chiu, Weizhi Meng 0001, Christian D. Jensen. 1-8 [doi]
- Mining Web Usage Profiles from Proxy Logs: User IdentificationJing Xu, Fei Xu, Fanshu Ma, Lei Zhou, Shuanglin Jiang, Zhibo Rao. 1-6 [doi]
- FastMove: Fast IP switching Moving Target Defense to mitigate DDOS AttacksNahid Bandi, Hesam Tajbakhsh, Morteza Analoui. 1-7 [doi]
- A Public-key Encryption with Multi-keyword Search Scheme for Cloud-based Smart GridsDong Zhang, Qing Fan, Hongyi Qiao, Min Luo. 1-6 [doi]
- DualNet: Locate Then Detect Effective Payload with Deep Attention NetworkShiyi Yang, Peilun Wu, Hui Guo. 1-8 [doi]
- Highly Efficient Anonymous IoT Authentication using Composite HashingHung-Yu Chien. 1-7 [doi]
- Using Generative Adversarial Networks for Data Augmentation in Android Malware DetectionYi-Ming Chen, Chun-Hsien Yang, Guo-Chung Chen. 1-8 [doi]
- DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management SystemsTakato Hirano, Yutaka Kawai, Yoshihiro Koseki. 1-8 [doi]
- Privacy-Preserving Smart Road Pricing System in Smart CitiesQingfeng Zhu, Sai Ji, Qi Liu. 1-2 [doi]