1
Information Security and Cryptology [E-Book] : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I /
Table of Contents: ... -- Compact Ring Signatures with Post-Quantum Security in Standard Model -- Secure Multi-Party SM2 Signature based on SPDZ Protocol -- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption -- A General Federated Learning...

Full text 
2
Security and Risk Analysis for Intelligent Edge Computing [E-Book] /
Table of Contents: ...Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things...

Full text 
3
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings /
Table of Contents: ... Attacks -- AIoTS - Artificial Intelligence and Industrial IoT Security -- Blockchain-enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks -- A Security Policy Engine for Building Energy Management Systems -- EARIC: Exploiting ADC...

Full text 
4
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings /
Table of Contents: ...-Safe Link -- POSTER: Enabling User-Accountable Mechanisms in Decision Systems -- POSTER: Key Generation Scheme Based on Physical Layer -- POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things -- POSTER: Ransomware detection mechanism - current...

Full text 
5
Frontiers in Cyber Security [E-Book] : 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings /
Table of Contents: ... -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross...

Full text 
6
Computer Security. ESORICS 2021 International Workshops [E-Book] : CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers /
Table of Contents: ... Vulnerabilities and IoT-enabled Attacks on Smart Lighting Systems -- TAESim: A Testbed for IoT Security Analysis of Trigger-action Environment -- Adversarial Command Detection Using Parallel Speech Recognition Systems -- Security Measuring System for IoT Devices...

Full text 
7
Security and Privacy in Social Networks and Big Data [E-Book] : 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings /
Table of Contents: ... Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors...

Full text