主页
外文期刊
OA 期刊
电子期刊
外文会议
中文期刊
标准
网络数据库
专业机构
企业门户
起重机械
生产工程
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Information Security and Cryptology
会议名
20th International Conference on Information Security and Cryptology (Inscrypt 2024)
中译名
《第二十届国际信息安全与密码学会议,卷1》
机构
International Association for Cryptologic Research (IACR)
会议日期
December 14-16, 2024
会议地点
Kunming, China
出版年
2025
馆藏号
356947
题名
作者
出版年
Revocable Registered Attribute-Based Keyword Search Supporting Fairness
Zongmin Wang; Qiang Wang; Fucai Zhou; Jian Xu
2025
HiddenStor: A Steganographic Storage System Built on Secret Sharing
Siyuan Ma; Yuewu Wang; Chunjing Kou; Peng Wang; Haotian Shi; Jiwu Jing
2025
TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous
Chenchen Wu; Weijing You; Li Xu
2025
On the Relationship Between Public Key Primitives via Indifferentiability
Shuang Hu; Bingsheng Zhang; Cong Zhang; Kui Ren
2025
Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions
Hongxiao Wang; Siu-Ming Yiu; Yanmin Zhao; Zoe L. Jiang; Min Xie
2025
From Signature with Re-randomizable Keys: Generic Construction of PDPKS
Ziyi Li; Ruida Wang; Xianhui Lu; Yao Cheng; Liming Gao
2025
SIMD Optimizations of White-Box Block Cipher Implementations with the Self-equivalence Framework
Luoqi Chen; Yufeng Tang; Liangju Zhao; Zheng Gong
2025
When Is Multi-channel Better Than Single-Channel: A Case Study of Product-Based Multi-channel Fusion Attacks
Shilong You; Jianfeng Du; Zhu Wang; Aimin Yu
2025
Privacy-Preserving Certificate-Less Authenticated Key Exchange with Key Registration Privacy
Li Duan; Yong Li
2025
An Improved Signal Leakage Attack Against DXL Key Exchange Protocol
Zhiwei Li; Jun Xu; Lei Hu
2025
srCPace: Universally Composable PAKE with Subversion-Resilience
Jiahao Liu; Yi Wang; Rongmao Chen; Xincheng Tang; Jinshu Su
2025
Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT
Haoyang Lu; Rui Zhang; Tong Kong
2025
EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning
Yifei Zhang; Zhenduo Hou; Yunkai Zou; Zhen Li; Ding Wang
2025
A Binary Code Similarity Detection Method Based on Multi-source Contrastive Learning
Hongyu Yang; Yunlong Wang; Ze Hu; Xiang Cheng
2025
Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement
Lixia Xie; Chenyang Wei; Hongyu Yang; Ze Hu; Xiang Cheng
2025
Attention-Based Decompilation Through Neural Machine Translation
Ruigang Liang; Ying Cao; Peiwei Hu; Kai Chen
2025
DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware
Linyu Li; Lei Yu; Qingli Guo; Ruixuan Zhang; Can Yang; Jun Guan; Xiaorui Gong
2025
Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid
Jiangang Lu; Yunfan Yang; Qinqin Wu; Benhan Li; Mingxin Lu
2025
NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets
Birou Gao; Rui Zhang; Yuting Xiao; Huan Zou
2025
Clustering Coefficient Estimating of Distributed Graph Data Based on Shuffled Differential Privacy
Hongfa Ding; Peiwang Fu; Heling Jiang; Xuesong Li; Linjiang Wu
2025
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2025