主页
外文期刊
OA 期刊
电子期刊
外文会议
中文期刊
标准
网络数据库
专业机构
企业门户
起重机械
生产工程
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Information and Communications Security
会议名
26th International Conference on Information and Communications Security (ICICS 2024)
中译名
《第二十六届国际信息与通信安全会议,卷2》
会议日期
August 26-28, 2024
会议地点
Mytilene, Greece
出版年
2025
馆藏号
355074
题名
作者
出版年
TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-training
Yuwei Xu; Zhengxin Xu; Jie Cao; Rongrong Wang; Yali Yuan; Guang Cheng
2025
Two-Round Post-quantum Private Equality Test and OT from RLWE-Encryption
Shengzhe Meng; Chengrui Dang; Bei Liang; Jintai Ding
2025
Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing
Iaroslav Gridin; Antonis Michalas
2025
FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection
Yong Li; Yueyang Feng; Xi Chen; Jian Zhang; Ruxian Li; Kewei Lv; Dawei Zhang
2025
X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts
Adam Caulfield; Nabiha Raza; Peizhao Hu
2025
Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions
Yan Xu; Li-Ping Wang; Huaxiong Wang
2025
Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM
Hao Huang; Xiaofen Wang; Ke Zhang; Man Ho Au; Sheng Cao; Qinglin Zhao; Xiaosong Zhang
2025
CoDPoC IP: A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme
Yijing Peng; Junhui Wang; Zhenyu Wang; Zhenbin Guo; Yaohua Wang; Ding Deng; Shaoqing Li; Yang Guo
2025
Formal Analysis of Julia Key Agreement Protocol
Navya Sivaraman; Simin Nadjm-Tehrani; Thomas Johansson
2025
New Construction of Code-Based Signature Schemes
Yang Yang; Fangguo Zhang
2025
Identity-Based Signature from Lattices Without Trapdoors
Pingbin Luo; Xinjian Chen; Willy Susilo; Qiong Huang
2025
The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication Through Password Managers
Ali Cherry; Konstantinos Barmpis; Siamak F. Shahandashti
2025
HoneyLLM: A Large Language Model-Powered Medium-Interaction Honeypot
Wenjun Fan; Zichen Yang; Yuanzhen Liu; Lang Qin; Jia Liu
2025
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Based on Time Series Representation Learning
Bo Cui; Shuai Liu
2025
Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases
Ke Yang; Shuguang Yuan; Jing Yu; Yuyang Wang; Tengfei Yang; Chi Chen
2025
FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting
Mingfeng Xin; Hui Wen; Liting Deng; Hong Li; Qiang Li; Limin Sun
2025
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2024