中国机械工程学会生产工程分会知识服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
生产工程
智能制造
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Information Security
会议名
28th International Conference on Information Security (ISC 2025)
中译名
《第二十八届国际信息安全会议》
会议日期
October 20-22, 2025
会议地点
Seoul, South Korea
出版年
2026
馆藏号
359385
题名
作者
出版年
Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA
Zhongxin Zhang; Yincen Chen; Ling Song; Yin Lv
2026
Keyless Physical-Layer Cryptography
Senlin Liu; Dongshu Cai; Dongchi Han; Hongbo Liu; Xianhui Lu
2026
The Multi-user Security of GCM-SST and Further Enhancements
Yusuke Naito; Yu Sasaki; Takeshi Sugawara
2026
SimSeq: A Robust TLS Traffic Classification Method
Jinghui Cheng; Fanping Zeng
2026
EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing Using Evolutionary Game Theory
Chengdong Wang; Bo Yu; Lin Yang
2026
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
Johanna Henrich; Nicolai Schmitt; Nouri Alnahawi; Andreas Heinemann
2026
Conditional Attribute-Based PRE: Definition and Construction from LWE
Lisha Yao; Jian Weng; Pengfei Wu; Guofeng Tang; Guomin Yang; Haiyang Xue; Robert H. Deng
2026
LastRings: Lattice-Based Scalable Threshold Ring Signatures
Sohyun Jeon; Calvin Abou Haidar; Mehdi Tibouchi
2026
Simulation-Based Software Leakage Evaluation for the RISC-V Platform
Nicolai Schmitt; Jannik Zeitschner; Andreas Heinemann
2026
GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks via Global Indirect Replacement
Hao Ma; Zhidong Wang; Da Xie; Ciyan Ouyang; Wei Song
2026
Inference Attacks on Encrypted Online Voting via Traffic Analysis
Anastasiia Belousova; Francesco Marchiori; Mauro Conti
2026
MSPP-Net: Fine-Grained Image Privacy Identification via Multi-stage Semantic Perception
Yinglong Li; Bingyuan Chen; Qingyan Jiang; Tieming Chen
2026
Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning
Xiaofei Huang; Xiaojie Zhu; Chi Chen
2026
Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images
Shahriar Rahman Khan; Tariqul Islam; Raiful Hasan
2026
Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures
Wataru Nakamura; Yusei Suzuki; Masakazu Fujio; Kenta Takahashi
2026
A New Code-Based Formulation of the Fuzzy Vault Scheme
Sara Majbour; Morgan Barbier; Jean-Marie Le Bars
2026
HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection
Yanbing Shen; Hao Sun; Jiacheng Wang; Haitao Xu; Gang Liu; Fan Zhang
2026
Towards Architecture-Independent Function Call Analysis for IoT Malware
Kensei Ma; Chansu Han; Akira Tanaka; Takeshi Takahashi; Jun'ichi Takeuchi
2026
HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection
Mohammad Reza Norouzian; Claudia Eckert
2026
A Graph-Based Approach to Alert Contextualisation in Security Operations Centres
Magnus Wiik Eckhoff; Peter Marius Flydal; Siem Peters; Martin Eian; Jonas Halvorsen; Vasileios Mavroeidis; Gudmund Grov
2026
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2026