default search action
5th CSP 2021: Zhuhai, China
- 5th IEEE International Conference on Cryptography, Security and Privacy, CSP 2021, Zhuhai, China, January 8-10, 2021. IEEE 2021, ISBN 978-1-7281-8621-4
- Youwu Zhou, Mingjun Liu, Aimin Ye:
A Scheme of Key Distribution in Smart Grid. 1-6 - Eric Sakk, Shuangbao Paul Wang:
Code Structures for Quantum Encryption and Decryption. 7-11 - Wei Li, Jing Si, Jianhua Xing, Yongjing Zhang, Deli Liu, Zhiyuan Sui:
Unified Attribute-Based Encryption Scheme for Industrial Internet of Things. 12-16 - Shuangbao Paul Wang, Eric Sakk:
Quantum Algorithms: Overviews, Foundations, and Speedups. 17-21 - Daniel Köhler, Eric Klieme, Matthias Kreuseler, Feng Cheng, Christoph Meinel:
Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords. 22-31 - Krishn Kumar Gupt, Meghana Kshirsagar, Joseph P. Sullivan, Conor Ryan:
Automatic Test Case Generation for Vulnerability Analysis of Galois Field Arithmetic Circuits. 32-37 - Michelle Poelman, Sarfraz Iqbal:
Investigating the Compliance of the GDPR: Processing Personal Data On A Blockchain. 38-44 - Liwei Liu, Maozhi Xu, Guoqing Zhou:
Analysis and Improvements to the Special Number Field Sieve for Discrete Logarithm Problems. 45-49 - Yanchun Cui, Kai Zhong, Ansheng Yin:
Trust Evaluation Algorithm based on Association Rule Extraction. 50-54 - Mark A. Brady, Ikram Ullah, Paul J. M. Havinga:
DOSing Distributed Ledger Technology: IOTA. 55-61 - Dominic Pirker, Thomas Fischer, Harald Witschnig, Christian Steger:
velink - A Blockchain-based Shared Mobility Platform for Private and Commercial Vehicles utilizing ERC-721 Tokens. 62-67 - Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Josep Domingo-Ferrer:
Lightweight Blockchain-based Platform for GDPR-Compliant Personal Data Management. 68-73 - Liangjie Lin, Yuchen Tian, Yang Liu:
A Blockchain-based Privacy-Preserving Recommendation Mechanism. 74-78 - Kunchang Li, Xu Han, Yifan Yang, Shuhao Wang, Runhua Shi, Jianbin Li:
A Novel Edge Computing Offloading and Privacy-preserving Scheme for Energy Internet. 79-83 - Sam Ng, Tomás Tauber, Leslie Cheung:
ECDSA-Compatible Privacy Preserving Signature With Designated Verifier. 84-89 - Yang Yang, Xuehui Du, Zhi Yang:
PRADroid: Privacy Risk Assessment for Android Applications. 90-95 - Naqliyah Zainuddin, Maslina Daud, Sabariah Ahmad, Mayasarah Maslizan, Syafiqa Anneisa Leng Abdullah:
A Study on Privacy Issues in Internet of Things (IoT). 96-100 - Kunzan Liu, Yuchen Jiao, Ye Jin, Xu Xiang, Yuantao Gu:
Dimensionality-reduced Secure Outlier Detection on Union of Subspaces. 101-106 - Jaouhar Fattahi, Mohamed Mejri:
SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques. 107-112 - Ting Ma, Feng Hu, Maode Ma:
A LSTM-Based Channel Fingerprinting Method for Intrusion Detection. 113-116 - Haoyu Gao, Leixiao Li, Hao Lin, Jianxiong Wan, Dan Deng, Jie Li:
DECH: A Novel Attack Pattern of Cloud Environment and Its Countermeasures. 117-122 - Haotian Zhang, Weiyu Dong, Jian Lin:
A Partial-Lifting-Based Compiling Concolic Execution Approach. 123-128 - Hanlin Long, Zhicheng Tian, Yang Liu:
Detecting Android Malware Based on Dynamic Feature Sequence and Attention Mechanism. 129-133 - Martin J. Butler, Rika Butler:
The Influence of Mobile Operating Systems on User Security Behavior. 134-138 - Haleh Shahzad, Abdul Rahman Sattar, Janahan Skandaraniyam:
DGA Domain Detection using Deep Learning. 139-143 - Jianhua Xing, Jing Si, Yongjing Zhang, Wei Li, Yuning Zheng:
Research on Malware Variant Detection Method Based on Deep Neural Network. 144-147 - Wouter Louman, Mitchell Vernee, Danique de Bruijn, Babette van't Riet, Hani Alers:
Mobile Firewall applications: An analysis of usability and effectiveness. 148-152 - Haiou Huang, Jianfeng Chu, Xiaochun Cheng:
Trend Analysis and Countermeasure Research of DDoS Attack Under 5G Network. 153-160 - Gaofeng Zhao, Rui Liu, Yang Li, Jin Huang, Mingxuan Zhang, Weiwei Miao:
Multi-user broadcast authenticaiton in Power LTE Private Network with Compressed Bloom Filter. 161-165 - Xiaojian Zhang, Liandong Chen, Jie Fan, Xiangqun Wang, Qi Wang:
Power IoT security protection architecture based on zero trust framework. 166-170 - Changqing Wang, Xiangyu Yang, Quancheng Du, Jiaxiang Wang:
Outage Performance of Satellite-UAV Network Framework based on NOMA. 171-175 - Abdulbast A. Abushgra:
SARG04 and AK15 Protocols Based on the Run-Time Execution and QBER. 176-180 - Xinghua Cheng, Zhilin Li:
Using Boltzmann Entropy to Measure Scrambling Degree of Grayscale Images. 181-185 - Yan Zheng, Weiyu Dong, Jiangtao Zhao:
ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph. 186-192 - Jaouhar Fattahi, Mohamed Mejri:
Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes. 193-199 - Md Abir Hasan, Orion Sky Lawlor, Nusrat Jahan:
Forensic Analysis of Binary Structures of Video Files. 200-204 - Xinyun Yan, Chishe Wang, Dahui Hao, Min Chen:
License Plate Detection Using Bayesian Method Based on Edge Features. 205-211
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.