Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model

    The exponential growth and widespread of fake news in online media have been causing unprecedented threats to the election result, public hygiene and justice. With ever-growing contents in online media, scruti...

    Cheuk Yu Ip, Fu Kay Frankie Li, Yi Anson Lam in Digital Forensics and Cyber Crime (2024)

  2. No Access

    Chapter and Conference Paper

    Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption

    Traceability, being the ability to access information of an item throughout its lifecycle, plays an important part in current supply chain, facilitating prompt response in case of incidents. In recent years, b...

    Tsz Ho Pun, Yi Jun He, Siu Ming Yiu in Ubiquitous Security (2024)

  3. No Access

    Chapter and Conference Paper

    SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE

    In recent years, distributed machine learning has garnered significant attention. However, privacy continues to be an unresolved issue within this field. Multi-key homomorphic encryption over torus (MKTFHE) is...

    Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu in Mobile Internet Security (2024)

  4. No Access

    Chapter and Conference Paper

    Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

    Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessin...

    Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao in Information Security and Cryptology (2024)

  5. No Access

    Chapter and Conference Paper

    A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions

    A software watermarking scheme is to embed a “mark” or a message into a program in a cryptographic way. It is useful in proving ownership (e.g., in applications to digital rights management) and in authenticat...

    Yanmin Zhao, Yang Wang, Siu Ming Yiu, Yu Liu, Meiqin Wang in Security and Trust Management (2023)

  6. No Access

    Chapter and Conference Paper

    Detecting Anomalous Programmable Logic Controller Events Using Process Mining

    Programmable logic controllers that monitor and control industrial processes are attractive targets for cyber attackers. Although techniques and tools have been developed for detecting anomalous programmable l...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Critical Infrastructure Protection XV (2022)

  7. No Access

    Chapter and Conference Paper

    Analyzing the Error Rates of Bitcoin Clustering Heuristics

    Bitcoin is a decentralized peer-to-peer cryptocurrency. Bitcoin’s strong cryptography ensures anonymity that makes it possible to profit from crimes such as ransomware attacks and money laundering. Unfortunate...

    Yanan Gong, Kam-Pui Chow, Hing-Fung Ting in Advances in Digital Forensics XVIII (2022)

  8. No Access

    Chapter and Conference Paper

    Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES

    We consider the related-tweak impossible differential cryptanalysis of TweAES. It is one of the underlying primitives of Authenticated Encryption with Associated Data (AEAD) scheme ESTATE which was accepted as on...

    Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang in Selected Areas in Cryptography (2022)

  9. No Access

    Chapter and Conference Paper

    Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability

    Time-lock puzzle schemes allow one to encrypt messages for the future. More concretely, one can efficiently generate a time-lock puzzle for a secret/solution s, such that s remains hidden until a specified time T

    Yi Liu, Qi Wang, Siu-Ming Yiu in Computer Security – ESORICS 2022 (2022)

  10. No Access

    Chapter and Conference Paper

    Blind Polynomial Evaluation and Data Trading

    Data trading is an emerging business, in which data sellers provide buyers with, for example, their private datasets and get paid from buyers. In many scenarios, sellers prefer to sell pieces of data, such as ...

    Yi Liu, Qi Wang, Siu-Ming Yiu in Applied Cryptography and Network Security (2021)

  11. No Access

    Chapter and Conference Paper

    LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks

    There are two popular location-based service (LBS) applications: searching k-nearest neighbor Points of Interests (kNN POIs) and finding Nearby Friends (NF) via a social network server (SNS). Nevertheless, bot...

    Cailing Cai, Tsz Hon Yuen, Handong Cui, Mingli Wu in Information Security and Cryptology (2021)

  12. No Access

    Chapter and Conference Paper

    An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster

    A cryptographic primitive, called encryption switching protocol (ESP), has been proposed recently. This two-party protocol enables interactively converting values encrypted under one scheme into another scheme...

    Yi Liu, Qi Wang, Siu-Ming Yiu in Information Security and Cryptology (2021)

  13. No Access

    Chapter and Conference Paper

    Improved Zero-Knowledge Argument of Encrypted Extended Permutation

    Extended permutation (EP) is a generalized notion of the standard permutation. Unlike the one-to-one correspondence map** of the standard permutation, EP allows to replicate or omit elements as many times as...

    Yi Liu, Qi Wang, Siu-Ming Yiu in Information Security and Cryptology (2021)

  14. No Access

    Chapter and Conference Paper

    Forced Independent Optimized Implementation of 4-Bit S-Box

    Searching the optimal circuit implementation of a Boolean function is still an open problem. This work proposes a new optimizing scheme, which could find circuit expressions with optimal gate equivalent comple...

    Yanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu in Information Security and Privacy (2021)

  15. No Access

    Chapter and Conference Paper

    Detection on GPS Spoofing in Location Based Mobile Games

    The widely used Global Positioning System (GPS) provides a handy way for electronic devices to locate their positions. Almost every mobile device nowadays has GPS module equipped inside. Apart from traditional...

    Shing Ki Wong, Siu Ming Yiu in Information Security Applications (2020)

  16. No Access

    Chapter and Conference Paper

    A Secure and Self-tallying E-voting System Based on Blockchain

    E-voting has been studied for many years. Recently, researchers find that blockchain can provide an alternative secure platform for e-voting systems, because of its properties of tamper resistance and transpar...

    Gongxian Zeng, Meiqi He, Siu Ming Yiu in Information Security Applications (2020)

  17. No Access

    Chapter and Conference Paper

    Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines

    Critical infrastructure assets such as power grids and water treatment plants are monitored and managed by industrial control systems. Attacks that leverage industrial control systems to disrupt or damage infr...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XVI (2020)

  18. No Access

    Chapter and Conference Paper

    Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model

    We propose a leakage-resilient inner-product functional encryption scheme (IPFE) in the bounded-retrieval model (BRM). This is the first leakage-resilient functional encryption scheme in the BRM. In our leakag...

    Linru Zhang, **angning Wang, Yuechen Chen in Information and Communications Security (2020)

  19. No Access

    Chapter and Conference Paper

    Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning

    Insider threat detection and investigation are major challenges in digital forensics. Unlike external attackers, insiders have privileges to access resources in their organizations and violations of normal beh...

    Yichen Wei, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XVI (2020)

  20. No Access

    Chapter and Conference Paper

    Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-Resilience

    There are lots of applications of inner-product functional encryption (IPFE). In this paper, we consider two important extensions of it. One is to enhance IPFE with access control such that only users with a p...

    Linru Zhang, **angning Wang, Yuechen Chen in Progress in Cryptology – INDOCRYPT 2020 (2020)

previous disabled Page of 3