


default search action
2nd FCS 2019: Xi'an, China
- Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu:

Frontiers in Cyber Security - Second International Conference, FCS 2019, Xi'an, China, November 15-17, 2019, Proceedings. Communications in Computer and Information Science 1105, Springer 2019, ISBN 978-981-15-0817-2
Symmetric Key Cryptography
- Li Kang, Leyou Zhang

:
Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud. 3-18
Public Key Cryptography
- Xiaoxu Gao, Leyou Zhang

, Gongcheng Hu:
Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation. 21-35 - Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:

Cryptographic Reverse Firewalls for Identity-Based Encryption. 36-52 - Yuyan Guo, Mingming Jiang, Shimin Wei, Ming Xie, Mei Sun:

Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles. 53-64
Post-quantum Cryptography
- Emmanuel Ahene

, Yuanfeng Guan, Zhiwei Zhang, Fagen Li
:
CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment. 67-83 - Fenghe Wang, Shaoquan Shi, Chunxiao Wang:

Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network Coding. 84-94 - Zilong Wang, Honggang Hu, Mengce Zheng

, Jiehui Nan:
Symmetric Lattice-Based PAKE from Approximate Smooth Projective Hash Function and Reconciliation Mechanism. 95-106 - Yanhua Zhang, Yifeng Yin

, Ximeng Liu, Qikun Zhang, Huiwen Jia:
Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation. 107-127 - Jiehui Nan, Mengce Zheng

, Honggang Hu:
Post-Quantum Pseudorandom Functions from Mersenne Primes. 128-142
Signature
- Mingming Jiang, Jinqiu Hou, Yuyan Guo, Yan Wang, Shimin Wei:

An Efficient Proxy Re-Signature Over Lattices. 145-160 - Qiyu Wang, Jie Chen, Lishuang Zhuang:

Batch Verification of Linkable Ring Signature in Smart Grid. 161-176 - Juan Ren, Leyou Zhang

:
Hierarchical Identity-Based Signature over Verifiable Random Function. 177-189
Attack and Behavior Detection
- Gongcheng Hu, Leyou Zhang

:
Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved Method. 193-208 - Leizhang Wang, Quanbo Qu, Tuoyan Li, Yange Chen:

Implementing Attacks on the Approximate Greatest Common Divisor Problem. 209-227 - Yusheng Dai, Hui Li, Xing Rong, Yahong Li, Min Zheng:

M4D: A Malware Detection Method Using Multimodal Features. 228-238 - Lin Ding

, Dawu Gu, Lei Wang:
New Key Recovery Attack on the MICKEY Family of Stream Ciphers. 239-249
Authenticated Key Agreement
- Jiehui Nan, Mengce Zheng

, Zilong Wang, Honggang Hu:
A General Construction for Password-Based Authenticated Key Exchange from Witness PRFs. 253-267 - Mwitende Gervais, Liang Sun, Ke Wang, Fagen Li:

Certificateless Authenticated Key Agreement for Decentralized WBANs. 268-290
Blockchain
- Nabeil Eltayieb

, Liang Sun, Ke Wang, Fagen Li:
A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain. 293-307 - Haiyong Yu, Juntao Gao, Tong Wu, Xuelian Li:

A Novel Fair and Verifiable Data Trading Scheme. 308-326 - Junfeng Tian, Xuan Jing, Ruifang Guo:

Public Audit Scheme of Shared Data Based on Blockchain. 327-344
System and Network Security
- Yanyan Han, Yanru He

, Peihe Liu, Xiaoxuan Yan, Na Li:
A Hybrid Key Management Scheme for Wireless Sensor Network. 347-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














