![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model
The exponential growth and widespread of fake news in online media have been causing unprecedented threats to the election result, public hygiene and justice. With ever-growing contents in online media, scruti...
-
Chapter and Conference Paper
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE
In recent years, distributed machine learning has garnered significant attention. However, privacy continues to be an unresolved issue within this field. Multi-key homomorphic encryption over torus (MKTFHE) is...
-
Chapter and Conference Paper
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessin...
-
Chapter and Conference Paper
A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions
A software watermarking scheme is to embed a “mark” or a message into a program in a cryptographic way. It is useful in proving ownership (e.g., in applications to digital rights management) and in authenticat...
-
Chapter and Conference Paper
Detecting Anomalous Programmable Logic Controller Events Using Process Mining
Programmable logic controllers that monitor and control industrial processes are attractive targets for cyber attackers. Although techniques and tools have been developed for detecting anomalous programmable l...
-
Chapter and Conference Paper
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
We consider the related-tweak impossible differential cryptanalysis of TweAES. It is one of the underlying primitives of Authenticated Encryption with Associated Data (AEAD) scheme ESTATE which was accepted as on...
-
Chapter and Conference Paper
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
Time-lock puzzle schemes allow one to encrypt messages for the future. More concretely, one can efficiently generate a time-lock puzzle for a secret/solution s, such that s remains hidden until a specified time T
-
Chapter and Conference Paper
Forced Independent Optimized Implementation of 4-Bit S-Box
Searching the optimal circuit implementation of a Boolean function is still an open problem. This work proposes a new optimizing scheme, which could find circuit expressions with optimal gate equivalent comple...
-
Chapter and Conference Paper
A Secure and Self-tallying E-voting System Based on Blockchain
E-voting has been studied for many years. Recently, researchers find that blockchain can provide an alternative secure platform for e-voting systems, because of its properties of tamper resistance and transpar...
-
Chapter and Conference Paper
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
We propose a leakage-resilient inner-product functional encryption scheme (IPFE) in the bounded-retrieval model (BRM). This is the first leakage-resilient functional encryption scheme in the BRM. In our leakag...
-
Chapter and Conference Paper
An Incident Response Model for Industrial Control System Forensics Based on Historical Events
Cyber attacks on industrial control systems are increasing. Malware such as Stuxnet, Havex and BlackEnergy have demonstrated that industrial control systems are attractive targets for attackers. However, indus...
-
Chapter and Conference Paper
A Forensic Logging System for Siemens Programmable Logic Controllers
Critical infrastructure assets are monitored and managed by industrial control systems. In recent years, these systems have evolved to adopt common networking standards that expose them to cyber attacks. Since...
-
Chapter and Conference Paper
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers
Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...
-
Chapter and Conference Paper
Privacy-Preserving Disease Risk Test Based on Bloom Filters
Decreasing costs in genome sequencing have been paving the way for personalised medicine. An increasing number of individuals choose to undergo disease risk tests provided by medical units. However, it poses s...
-
Chapter and Conference Paper
LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)
Due to the advancement of side-channel attacks, leakage-resilient cryptography has attracted a lot of attention in recent years. Many fruitful results have been proposed by researchers. Most, if not all, of th...
-
Chapter and Conference Paper
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery
Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...
-
Chapter and Conference Paper
Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner
Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenu...
-
Chapter and Conference Paper
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model
Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted users. It may not hold in the real world due to the side-channel attacks. Leakage-resilient cryptography is propo...
-
Chapter and Conference Paper
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at least 1024bi...
-
Chapter and Conference Paper
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones
Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in...