会议文集


文集名Information and Communications Security
会议名26th International Conference on Information and Communications Security (ICICS 2024)
中译名《第二十六届国际信息与通信安全会议,卷2》
会议日期August 26-28, 2024
会议地点Mytilene, Greece
出版年2025
馆藏号355074


题名作者出版年
TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-trainingYuwei Xu; Zhengxin Xu; Jie Cao; Rongrong Wang; Yali Yuan; Guang Cheng2025
Two-Round Post-quantum Private Equality Test and OT from RLWE-EncryptionShengzhe Meng; Chengrui Dang; Bei Liang; Jintai Ding2025
Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted FuzzingIaroslav Gridin; Antonis Michalas2025
FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater DetectionYong Li; Yueyang Feng; Xi Chen; Jian Zhang; Ruxian Li; Kewei Lv; Dawei Zhang2025
X-Cipher: Achieving Data Resiliency in Homomorphic CiphertextsAdam Caulfield; Nabiha Raza; Peizhao Hu2025
Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted FunctionsYan Xu; Li-Ping Wang; Huaxiong Wang2025
Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGMHao Huang; Xiaofen Wang; Ke Zhang; Man Ho Au; Sheng Cao; Qinglin Zhao; Xiaosong Zhang2025
CoDPoC IP: A Configurable Data Protection Circuit to Support Multiple Key Agreement SchemeYijing Peng; Junhui Wang; Zhenyu Wang; Zhenbin Guo; Yaohua Wang; Ding Deng; Shaoqing Li; Yang Guo2025
Formal Analysis of Julia Key Agreement ProtocolNavya Sivaraman; Simin Nadjm-Tehrani; Thomas Johansson2025
New Construction of Code-Based Signature SchemesYang Yang; Fangguo Zhang2025
Identity-Based Signature from Lattices Without TrapdoorsPingbin Luo; Xinjian Chen; Willy Susilo; Qiong Huang2025
The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication Through Password ManagersAli Cherry; Konstantinos Barmpis; Siamak F. Shahandashti2025
HoneyLLM: A Large Language Model-Powered Medium-Interaction HoneypotWenjun Fan; Zichen Yang; Yuanzhen Liu; Lang Qin; Jia Liu2025
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Based on Time Series Representation LearningBo Cui; Shuai Liu2025
Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational DatabasesKe Yang; Shuguang Yuan; Jing Yu; Yuyang Wang; Tengfei Yang; Chi Chen2025
FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hostingMingfeng Xin; Hui Wen; Liting Deng; Hong Li; Qiang Li; Limin Sun2025