Skip to main content

Page of 3
and
  1. No Access

    Chapter

    A Game-Theoretic Framework for Incentive Mechanism Design in Federated Learning

    Federated learning (FL) has great potential for coalescing isolated data islands. It enables privacy-preserving collaborative model training and addresses security and privacy concerns. Besides booming technol...

    Mingshu Cong, Han Yu, ** Weng, Siu Ming Yiu in Federated Learning (2020)

  2. Chapter and Conference Paper

    An Incident Response Model for Industrial Control System Forensics Based on Historical Events

    Cyber attacks on industrial control systems are increasing. Malware such as Stuxnet, Havex and BlackEnergy have demonstrated that industrial control systems are attractive targets for attackers. However, indus...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Critical Infrastructure Protection XIII (2019)

  3. No Access

    Chapter and Conference Paper

    From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions

    The “all-or-nothing” notion of traditional public-key encryptions is found to be insufficient for many emerging applications in which users are only allowed to obtain a functional value of the ciphertext witho...

    Linru Zhang, Yuechen Chen, Jun Zhang in Codes, Cryptology and Information Security (2019)

  4. No Access

    Chapter and Conference Paper

    Strong Known Related-Key Attacks and the Security of ECDSA

    The classical related-key attack (RKA) model fails to capture some real world systems that introduce related secret keys by design. In some blockchain applications, public keys are generated in a way that th...

    Tsz Hon Yuen, Siu-Ming Yiu in Network and System Security (2019)

  5. No Access

    Book and Conference Proceedings

    Network and System Security

    12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings

    Man Ho Au, Siu Ming Yiu, Dr. ** Li, **apu Luo in Lecture Notes in Computer Science (2018)

  6. Chapter and Conference Paper

    A Forensic Logging System for Siemens Programmable Logic Controllers

    Critical infrastructure assets are monitored and managed by industrial control systems. In recent years, these systems have evolved to adopt common networking standards that expose them to cyber attacks. Since...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XIV (2018)

  7. Chapter and Conference Paper

    Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers

    Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...

    Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau in Advances in Digital Forensics XIV (2018)

  8. Chapter and Conference Paper

    Privacy-Preserving Disease Risk Test Based on Bloom Filters

    Decreasing costs in genome sequencing have been paving the way for personalised medicine. An increasing number of individuals choose to undergo disease risk tests provided by medical units. However, it poses s...

    Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu in Information and Communications Security (2018)

  9. No Access

    Chapter and Conference Paper

    Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency

    We construct a compact public-key encryption with tight CCA security in the multi-user, multi-challenge setting, where the reduction loss is a constant. Our scheme follows the Hofheinz-Jager framework but is c...

    Puwen Wei, Wei Wang, Bingxin Zhu, Siu Ming Yiu in Information Security and Privacy (2017)

  10. No Access

    Chapter and Conference Paper

    LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)

    Due to the advancement of side-channel attacks, leakage-resilient cryptography has attracted a lot of attention in recent years. Many fruitful results have been proposed by researchers. Most, if not all, of th...

    **aoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang in Information Security Applications (2017)

  11. Chapter and Conference Paper

    Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery

    Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...

    Jun Zhang, Meiqi He, Siu-Ming Yiu in Data and Applications Security and Privacy XXXI (2017)

  12. Chapter and Conference Paper

    Semantic Video Carving Using Perceptual Hashing and Optical Flow

    Video files are frequently encountered in digital forensic investigations. However, these files are usually fragmented and are not stored consecutively on physical media. Suspects may logically delete the file...

    Junbin Fang, Si** Li, Guikai **, Zoe Jiang in Advances in Digital Forensics XIII (2017)

  13. No Access

    Chapter and Conference Paper

    Attribute-Based Encryption Resilient to Auxiliary Input

    The auxiliary input model defines a class of computationally uninvertible function families \(\mathcal {F}\) ...

    Zhiwei Wang, Siu Ming Yiu in Provable Security (2015)

  14. Chapter and Conference Paper

    FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS

    Many techniques have been proposed for file recovery, but recovering fragmented files is still a challenge in digital forensics, especially when the files are damaged. This chapter focuses on JPEG files, one o...

    Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XI (2015)

  15. No Access

    Chapter and Conference Paper

    CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency

    Under the strengthened subgroup indistinguishability assumption, we present a new generic construction of chosen ciphertext attack (CCA) secure public key encryption scheme, achieve resilience to auxiliary inp...

    Zhiwei Wang, Siu Ming Yiu in Information Security (2015)

  16. No Access

    Book and Conference Proceedings

    Information Security

    17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings

    Sherman S. M. Chow, Jan Camenisch, Lucas C. K. Hui in Lecture Notes in Computer Science (2014)

  17. No Access

    Book and Conference Proceedings

    Provable Security

    8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings

    Sherman S. M. Chow, Joseph K. Liu, Lucas C. K. Hui in Lecture Notes in Computer Science (2014)

  18. Chapter and Conference Paper

    Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

    Identity-based encryption (IBE) is useful for providing end-to-end access control and data protection in many scenarios such as cloud applications and wireless sensor networks However, there are some practical...

    Tsz Hon Yuen, Ye Zhang, Siu Ming Yiu, Joseph K. Liu in Computer Security - ESORICS 2014 (2014)

  19. No Access

    Chapter and Conference Paper

    Attribute Specified Identity-Based Encryption

    Fine-grained access control of encrypted data without trusted third party is a challenging task. Using the simple attribute-based encryption has the problem of key escrow, since there exists a trusted authorit...

    Hao **ong, Tsz Hon Yuen, Cong Zhang in Information Security Practice and Experien… (2013)

  20. Chapter and Conference Paper

    Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner

    Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenu...

    Tat Wing Chim, Siu Ming Yiu, Lucas Chi Kwong Hui in Information and Communications Security (2012)

Page of 3