1
Security and Privacy in Social Networks and Big Data [E-Book] : 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings /
Table of Contents: ... Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors...

Full text 
2
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings /
Table of Contents: ...-Safe Link -- POSTER: Enabling User-Accountable Mechanisms in Decision Systems -- POSTER: Key Generation Scheme Based on Physical Layer -- POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things -- POSTER: Ransomware detection mechanism - current...

Full text 
3
Frontiers in Cyber Security [E-Book] : 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings /
Table of Contents: ... -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross...

Full text