中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Information Security
会议名28th International Conference on Information Security (ISC 2025)
中译名《第二十八届国际信息安全会议》
会议日期October 20-22, 2025
会议地点Seoul, South Korea
出版年2026
馆藏号359385


题名作者出版年
Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENAZhongxin Zhang; Yincen Chen; Ling Song; Yin Lv2026
Keyless Physical-Layer CryptographySenlin Liu; Dongshu Cai; Dongchi Han; Hongbo Liu; Xianhui Lu2026
The Multi-user Security of GCM-SST and Further EnhancementsYusuke Naito; Yu Sasaki; Takeshi Sugawara2026
SimSeq: A Robust TLS Traffic Classification MethodJinghui Cheng; Fanping Zeng2026
EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing Using Evolutionary Game TheoryChengdong Wang; Bo Yu; Lin Yang2026
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?Johanna Henrich; Nicolai Schmitt; Nouri Alnahawi; Andreas Heinemann2026
Conditional Attribute-Based PRE: Definition and Construction from LWELisha Yao; Jian Weng; Pengfei Wu; Guofeng Tang; Guomin Yang; Haiyang Xue; Robert H. Deng2026
LastRings: Lattice-Based Scalable Threshold Ring SignaturesSohyun Jeon; Calvin Abou Haidar; Mehdi Tibouchi2026
Simulation-Based Software Leakage Evaluation for the RISC-V PlatformNicolai Schmitt; Jannik Zeitschner; Andreas Heinemann2026
GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks via Global Indirect ReplacementHao Ma; Zhidong Wang; Da Xie; Ciyan Ouyang; Wei Song2026
Inference Attacks on Encrypted Online Voting via Traffic AnalysisAnastasiia Belousova; Francesco Marchiori; Mauro Conti2026
MSPP-Net: Fine-Grained Image Privacy Identification via Multi-stage Semantic PerceptionYinglong Li; Bingyuan Chen; Qingyan Jiang; Tieming Chen2026
Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-TuningXiaofei Huang; Xiaojie Zhu; Chi Chen2026
Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated ImagesShahriar Rahman Khan; Tariqul Islam; Raiful Hasan2026
Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy SignaturesWataru Nakamura; Yusei Suzuki; Masakazu Fujio; Kenta Takahashi2026
A New Code-Based Formulation of the Fuzzy Vault SchemeSara Majbour; Morgan Barbier; Jean-Marie Le Bars2026
HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat DetectionYanbing Shen; Hao Sun; Jiacheng Wang; Haitao Xu; Gang Liu; Fan Zhang2026
Towards Architecture-Independent Function Call Analysis for IoT MalwareKensei Ma; Chansu Han; Akira Tanaka; Takeshi Takahashi; Jun'ichi Takeuchi2026
HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware DetectionMohammad Reza Norouzian; Claudia Eckert2026
A Graph-Based Approach to Alert Contextualisation in Security Operations CentresMagnus Wiik Eckhoff; Peter Marius Flydal; Siem Peters; Martin Eian; Jonas Halvorsen; Vasileios Mavroeidis; Gudmund Grov2026
12