知识中心主页
文献服务
文献资源
外文期刊
外文会议
专业机构
智能制造
高级检索
版权声明
使用帮助
会议文集
文集名
Information Security
会议名
28th International Conference on Information Security (ISC 2025)
中译名
《第二十八届国际信息安全会议》
会议日期
October 20-22, 2025
会议地点
Seoul, South Korea
出版年
2026
馆藏号
359385
题名
作者
出版年
Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA
Zhongxin Zhang; Yincen Chen; Ling Song; Yin Lv
2026
Keyless Physical-Layer Cryptography
Senlin Liu; Dongshu Cai; Dongchi Han; Hongbo Liu; Xianhui Lu
2026
The Multi-user Security of GCM-SST and Further Enhancements
Yusuke Naito; Yu Sasaki; Takeshi Sugawara
2026
SimSeq: A Robust TLS Traffic Classification Method
Jinghui Cheng; Fanping Zeng
2026
EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing Using Evolutionary Game Theory
Chengdong Wang; Bo Yu; Lin Yang
2026
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
Johanna Henrich; Nicolai Schmitt; Nouri Alnahawi; Andreas Heinemann
2026
Conditional Attribute-Based PRE: Definition and Construction from LWE
Lisha Yao; Jian Weng; Pengfei Wu; Guofeng Tang; Guomin Yang; Haiyang Xue; Robert H. Deng
2026
LastRings: Lattice-Based Scalable Threshold Ring Signatures
Sohyun Jeon; Calvin Abou Haidar; Mehdi Tibouchi
2026
Simulation-Based Software Leakage Evaluation for the RISC-V Platform
Nicolai Schmitt; Jannik Zeitschner; Andreas Heinemann
2026
GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks via Global Indirect Replacement
Hao Ma; Zhidong Wang; Da Xie; Ciyan Ouyang; Wei Song
2026
Inference Attacks on Encrypted Online Voting via Traffic Analysis
Anastasiia Belousova; Francesco Marchiori; Mauro Conti
2026
MSPP-Net: Fine-Grained Image Privacy Identification via Multi-stage Semantic Perception
Yinglong Li; Bingyuan Chen; Qingyan Jiang; Tieming Chen
2026
Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning
Xiaofei Huang; Xiaojie Zhu; Chi Chen
2026
Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images
Shahriar Rahman Khan; Tariqul Islam; Raiful Hasan
2026
Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures
Wataru Nakamura; Yusei Suzuki; Masakazu Fujio; Kenta Takahashi
2026
A New Code-Based Formulation of the Fuzzy Vault Scheme
Sara Majbour; Morgan Barbier; Jean-Marie Le Bars
2026
HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection
Yanbing Shen; Hao Sun; Jiacheng Wang; Haitao Xu; Gang Liu; Fan Zhang
2026
Towards Architecture-Independent Function Call Analysis for IoT Malware
Kensei Ma; Chansu Han; Akira Tanaka; Takeshi Takahashi; Jun'ichi Takeuchi
2026
HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection
Mohammad Reza Norouzian; Claudia Eckert
2026
A Graph-Based Approach to Alert Contextualisation in Security Operations Centres
Magnus Wiik Eckhoff; Peter Marius Flydal; Siem Peters; Martin Eian; Jonas Halvorsen; Vasileios Mavroeidis; Gudmund Grov
2026
1
2
制造业外文文献服务平台