All Stories

  1. GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients
  2. A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures
  3. CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses
  4. Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup
  5. Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual
  6. P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
  7. Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception
  8. Short Principal Ideal Problem in multicubic fields
  9. Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices
  10. Multi Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
  11. Security, Privacy, and Trust for Cyberphysical-Social Systems
  12. Securely Reinforcing Synchronization for Embedded Online Contests
  13. An efficient and provably secure RFID grouping proof protocol
  14. Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data
  15. Anonymous Yoking-Group Proofs
  16. Generalized closest substring encryption
  17. Fair Multi-signature
  18. A short ID-based proxy signature scheme
  19. Information Security and Privacy
  20. Fully Homomorphic Encryption Using Hidden Ideal Lattice
  21. A robust smart card-based anonymous user authentication protocol for wireless communications
  22. Deniability and forward secrecy of one-round authenticated key exchange
  23. Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme
  24. Provable Security
  25. Efficient oblivious transfers with access control
  26. Information Security and Privacy
  27. Information and Communications Security
  28. Self-certified ring signatures
  29. CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs
  30. Recursive Lattice Reduction
  31. Improving Software Testing Cost-Effectiveness through Dynamic Partitioning
  32. Biometrics for Electronic Health Records
  33. Information Security and Privacy
  34. Information Security Practice and Experience
  35. Provable Security
  36. Personal Health Record Systems and Their Security Protection
  37. Securing Mobile Data Computing in Healthcare