![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessMultiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system
Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient informa...
-
Article
Open AccessA multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model
Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic technology is cryptographic algorithm, and the cryptographic a...
-
Article
Open AccessTimed-release encryption anonymous interaction protocol based on smart contract
Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios. To solve the reliability issue of nodes in ex...
-
Article
Open AccessA tamper-resistant timed secure data transmission protocol based on smart contract
Many time-sensitive scenarios need to decrypt data at a specified time. The timed-release encryption (TRE) primitive can meet this requirement. However, in the single-time server TRE model, there is a single p...
-
Article
A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model
Cryptographic algorithm identification is aimed to analyze the potential feature information in ciphertext data when the ciphertext is known, which belongs to the category of cryptanalysis. This paper takes bl...
-
Chapter and Conference Paper
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information
In recent years, unending breaches of users’ personally identifiable information (PII) have become increasingly severe, making targeted password guessing using PII a practical threat. However, to our knowledge...
-
Article
Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries
Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resul...
-
Chapter and Conference Paper
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties
Deduplication is widely used to improve space efficiency in cloud storage. The Updatable block-level Message-Locked Encryption (UMLE) has been proposed to achieve efficient block-level updates for a deduplication...
-
Chapter and Conference Paper
Homomorphic Modular Reduction and Improved Bootstrap** for BGV Scheme
Bootstrap** is a crucial subroutine of fully homomorphic encryption (FHE), where a homomorphic encryption scheme evaluates its own decryption circuits. Homomorphic modular reduction is a crucial part of boot...
-
Chapter and Conference Paper
A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query
Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resul...
-
Chapter and Conference Paper
Security-Enhanced Timed-Release Encryption in the Random Oracle Model
Timed-release encryption (TRE) is a cryptographic primitive that the sender specifies the future decryption time of the receiver. At present, most TRE schemes implement the control of decryption time based on ...
-
Chapter and Conference Paper
Walls Have Ears: Eavesdrop** User Behaviors via Graphics-Interrupt-Based Side Channel
Graphics Processing Units (GPUs) are now playing a vital role in many devices and systems including computing devices, data centers, and clouds, making them the next target of side-channel attacks. Unlike thos...
-
Chapter and Conference Paper
Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted Data
Traditional searchable encryption schemes focus on preventing an honest-but-curious server. In practice, cloud servers may delete user data, perform partial queries and even falsify search results to save comp...
-
Chapter and Conference Paper
Explaining Concept Drift of Deep Learning Models
Deep learning has been widely used in many fields and has achieved excellent performance, especially in the field of malware detection. Since attackers constantly change malware to avoid being detected by mach...
-
Chapter and Conference Paper
Effective L-Diversity Anonymization Algorithm Based on Improved Clustering
Mass data has been collected and released everyday, at the same time, the published data contains a lot of sensitive information related to individuals. K-anonymity privacy preserving mechanisms can prevent t...
-
Chapter and Conference Paper
Password Guessing via Neural Language Modeling
Passwords are the major part of authentication in current social networks. The state-of-the-art password guessing approaches, such as Markov model and probabilistic context-free grammars (PCFG) model, assign a...
-
Chapter and Conference Paper
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Map**
VM-based software obfuscation has emerged as an effective technique for program obfuscation. Despite various attempts in improving its effectiveness and security
-
Article
Semantic-integrated software watermarking with tamper-proofing
The existing works of software watermarking have the intrinsic defects: watermarking is independent of program semantics and have weak strength and resilience to state-of-the-art reverse engineering such as sy...
-
Chapter and Conference Paper
Harden Tamper-Proofing to Combat MATE Attack
The malicious modification on software is a major threat on software copyright. As a common protection method, tamper-proofing can detect and respond the malicious modification. However, existing works conside...
-
Chapter and Conference Paper
Identifying Bitcoin Users Using Deep Neural Network
In Bitcoin user identification, an important challenge is to accurately link Bitcoin addresses to their owners. Previously, some heuristics based on transaction structural rules or observations were found and ...