Information Security
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
Chapter and Conference Paper
Critical infrastructure assets are monitored and managed by industrial control systems. In recent years, these systems have evolved to adopt common networking standards that expose them to cyber attacks. Since...
Chapter and Conference Paper
Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...
Chapter and Conference Paper
Decreasing costs in genome sequencing have been paving the way for personalised medicine. An increasing number of individuals choose to undergo disease risk tests provided by medical units. However, it poses s...
Chapter and Conference Paper
We construct a compact public-key encryption with tight CCA security in the multi-user, multi-challenge setting, where the reduction loss is a constant. Our scheme follows the Hofheinz-Jager framework but is c...
Chapter and Conference Paper
Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...
Chapter and Conference Paper
Video files are frequently encountered in digital forensic investigations. However, these files are usually fragmented and are not stored consecutively on physical media. Suspects may logically delete the file...
Chapter and Conference Paper
The auxiliary input model defines a class of computationally uninvertible function families \(\mathcal {F}\) ...
Chapter and Conference Paper
Many techniques have been proposed for file recovery, but recovering fragmented files is still a challenge in digital forensics, especially when the files are damaged. This chapter focuses on JPEG files, one o...
Chapter and Conference Paper
Under the strengthened subgroup indistinguishability assumption, we present a new generic construction of chosen ciphertext attack (CCA) secure public key encryption scheme, achieve resilience to auxiliary inp...
Book and Conference Proceedings
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
Book and Conference Proceedings
8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings