Information Security
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
Book and Conference Proceedings
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
Book and Conference Proceedings
8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
Chapter and Conference Paper
The auxiliary input model defines a class of computationally uninvertible function families \(\mathcal {F}\) ...
Chapter and Conference Paper
Many techniques have been proposed for file recovery, but recovering fragmented files is still a challenge in digital forensics, especially when the files are damaged. This chapter focuses on JPEG files, one o...
Chapter and Conference Paper
Under the strengthened subgroup indistinguishability assumption, we present a new generic construction of chosen ciphertext attack (CCA) secure public key encryption scheme, achieve resilience to auxiliary inp...
Chapter and Conference Paper
We construct a compact public-key encryption with tight CCA security in the multi-user, multi-challenge setting, where the reduction loss is a constant. Our scheme follows the Hofheinz-Jager framework but is c...
Chapter and Conference Paper
Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...
Chapter and Conference Paper
Video files are frequently encountered in digital forensic investigations. However, these files are usually fragmented and are not stored consecutively on physical media. Suspects may logically delete the file...