Information and Communications Security
25th International Conference, ICICS 2023, Tian**, China, November 18–20, 2023, Proceedings
Chapter and Conference Paper
As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If the...
Chapter and Conference Paper
Book and Conference Proceedings
25th International Conference, ICICS 2023, Tian**, China, November 18–20, 2023, Proceedings
Chapter and Conference Paper
GGM tree is widely used in the design of correlated oblivious transfer (COT), subfield vector oblivious linear evaluation (sVOLE), distributed point function (DPF), and distributed comparison function (DCF). O...
Book and Conference Proceedings
7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
Chapter and Conference Paper
The traditional data masking systems cannot provide reversible operations for database, and they will destroy the referential integrity of database. To solve the problems above, we provide a new data masking s...
Chapter and Conference Paper
We studied the problem on applying format-preserving encryption (FPE) to character data, specifically the uncertainty of the binary size of ciphertexts caused by variable-width encoding. In this paper, we sugg...
Chapter and Conference Paper
As Internet is increasingly prosperous, Web services become more common in our social life. As users can access pages on the Web directly, Web application plays a vital role in various domains such as e-financ...
Chapter and Conference Paper
In a secure data sharing system, the keyword search over encrypted files is a basic need of a user with appropriate privileges. Although the traditional searchable encryption technique can provide the privacy ...
Chapter and Conference Paper
This paper introduces and explores a new concept of public key timed-release attribute-based encryption (PKTRABE) which can be used to solve the time-dependent ABE problem. In our PKTRABE model, the sender enc...
Chapter and Conference Paper
Data sharing systems based on cloud storage have attracted much attention recently. In such systems, encryption techniques are usually utilized to protect the privacy of outsourced sensitive data. However, to ...
Chapter and Conference Paper
Outsourcing database has attracted much attention recently due to the emergence of Cloud Computing. However, there are still two problems to solve, 1) how to encipher and protect the sensitive information befo...
Chapter and Conference Paper
As cloud computing becomes prevalent, more and more sensitive information is being centralized into the cloud, which raises a new challenge on how to efficiently share the outsourced data in a fine-grained man...