Network and System Security
12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
Chapter
Federated learning (FL) has great potential for coalescing isolated data islands. It enables privacy-preserving collaborative model training and addresses security and privacy concerns. Besides booming technol...
Chapter and Conference Paper
Cyber attacks on industrial control systems are increasing. Malware such as Stuxnet, Havex and BlackEnergy have demonstrated that industrial control systems are attractive targets for attackers. However, indus...
Chapter and Conference Paper
The “all-or-nothing” notion of traditional public-key encryptions is found to be insufficient for many emerging applications in which users are only allowed to obtain a functional value of the ciphertext witho...
Chapter and Conference Paper
The classical related-key attack (RKA) model fails to capture some real world systems that introduce related secret keys by design. In some blockchain applications, public keys are generated in a way that th...
Book and Conference Proceedings
12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
Chapter and Conference Paper
Critical infrastructure assets are monitored and managed by industrial control systems. In recent years, these systems have evolved to adopt common networking standards that expose them to cyber attacks. Since...
Chapter and Conference Paper
Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...
Chapter and Conference Paper
Decreasing costs in genome sequencing have been paving the way for personalised medicine. An increasing number of individuals choose to undergo disease risk tests provided by medical units. However, it poses s...
Chapter and Conference Paper
We construct a compact public-key encryption with tight CCA security in the multi-user, multi-challenge setting, where the reduction loss is a constant. Our scheme follows the Hofheinz-Jager framework but is c...
Chapter and Conference Paper
Due to the advancement of side-channel attacks, leakage-resilient cryptography has attracted a lot of attention in recent years. Many fruitful results have been proposed by researchers. Most, if not all, of th...
Chapter and Conference Paper
Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...
Chapter and Conference Paper
Video files are frequently encountered in digital forensic investigations. However, these files are usually fragmented and are not stored consecutively on physical media. Suspects may logically delete the file...
Chapter and Conference Paper
The auxiliary input model defines a class of computationally uninvertible function families \(\mathcal {F}\) ...
Chapter and Conference Paper
Many techniques have been proposed for file recovery, but recovering fragmented files is still a challenge in digital forensics, especially when the files are damaged. This chapter focuses on JPEG files, one o...
Chapter and Conference Paper
Under the strengthened subgroup indistinguishability assumption, we present a new generic construction of chosen ciphertext attack (CCA) secure public key encryption scheme, achieve resilience to auxiliary inp...
Book and Conference Proceedings
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
Book and Conference Proceedings
8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
Chapter and Conference Paper
Identity-based encryption (IBE) is useful for providing end-to-end access control and data protection in many scenarios such as cloud applications and wireless sensor networks However, there are some practical...
Chapter and Conference Paper
Fine-grained access control of encrypted data without trusted third party is a challenging task. Using the simple attribute-based encryption has the problem of key escrow, since there exists a trusted authorit...
Chapter and Conference Paper
Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenu...