13th International Conference on Network and System Security
Sapporo, Japan
| 15-18 December 2019
Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks Bagus Santoso (The University of Electro-Communications, Japan) Yasutada Oohama (The University of Electro-Communications, Japan) Chunhua Su (University of Aizu, Japan) |
Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation Liu Liu (Swinburne University of Technology, Australia) Chao Chen (Swinburne University of Technology, Australia) Jun Zhang (Swinburne University of Technology, Australia) Olivier De Vel (Australia Defence Science and Technology (DST) Group, Australia) Yang Xiang (Siwnburne University of Technology, Australia) |
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey Qingqing Gan (Jinan University, China) Cong Zuo (Monash University, Australia) Jianfeng Wang (Xidian University, China) Shi-Feng Sun (Monash University, Australia) Xiaoming Wang (Jinan University, China) |
A Graph Database-based Approach to Analyze Network Log Files Lars Diederichsen (German Federal Police, Germany) Kim-Kwang Raymond Choo (The University of Texas at San Antonio, USA, United States) Nhien An Le Khac (University College Dublin, Ireland) |
A Privacy-Enhancing Framework for Internet of Things Services Lukas Malina (Brno University of Technology, Czechia) Gautam Srivastava (Department of Mathematics and Computer Science, Brandon University, Canada) Petr Dzurenda (Brno University of Technology, Czechia) Jan Hajny (Brno University of Technology, Czechia) Sara Ricci (Brno University of Technology, Czechia) |
Using Audio Characteristics for Mobile Device Authentication Matthew Dekker (University of Waikato, New Zealand) Vimal Kumar (University of Waikato, New Zealand) |
Ethereum Analysis via Node Clustering Hanyi Sun (Shanghai Jiao Tong University, China) Na Ruan (Shanghai Jiao Tong University, China) Hanqing Liu (Shanghai Jiao Tong University, China) |
Strong Known Related-Key Attacks and the Security of ECDSA Tsz Hon Yuen (The University of Hong Kong, Hong Kong) Siu Ming Yiu (The University of Hong Kong, Hong Kong) |
Threat Assessment of Enterprise Applications via Graphical Modelling Rk Shyamasundar (IIT Bombay, India) Manjunath Bilur (IIT Bombay, India) Anugrah Gari (IIT Bombay, India) |
A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing Yawei Wang (Xi'an Jiaotong University, China) Chenxu Wang (Xi'an Jiaotong University, China) Xiapu Luo (The Hong Kong Polytechnic University, China) Kaixiang Zhang (WeBank Co., Ltd, China) Huizhong Li (WeBank Co., Ltd, China) |
Towards Secure Open Banking Architecture: An Evaluation with OWASP Deina Kellezi (Technical University of Denmark, Denmark) Christian Boegelund (Technical University of Denmark, Denmark) Weizhi Meng (Department of Applied Mathematics and Computer Science, Technical Universtiy of Denmark, Denmark) |
OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms Luis Filipe Dias (Academia Militar, Portugal) Helder Reia (Academia Militar, Poland) Rui Neves (Instituto de Telecomunicacoes, Portugal) Miguel Correia (Universidade de Lisboa, Portugal) |
OVERSCAN: OAuth 2.0 Scanner for Missing Parameters Karin Sumongkayothin (Faculty of Information and Communication Technology, Mahidol University, Thailand) Pakpoom Rachtrachoo (Faculty of Information and Communication Technology, Mahidol University, Thailand) Arnuphap Yupuech (Faculty of Information and Communication Technology, Mahidol University, Thailand) Kasidit Siriporn (Faculty of Information and Communication Technology, Mahidol University, Thailand) |
LaT-Voting: Traceable Anonymous E-Voting on Blockchain Peng Li (Jinan University, China) Junzuo Lai (Jinan University, China) |
Distributed Secure Storage System Based on Blockchain and TPA Huili Wang (State Key Laboratory of Integrated Services Networks; Xidian University, China) Wenping Ma (Xidian University, China) Haibin Zheng (Beihang University, China) Qianhong Wu (Beihang University, China) |
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique Zhentian Xiong (Harbin Institute of Technology, Shenzhen, China) Zoe L. Jiang (Harbin Institute of Technology, Shenzhen; Pengcheng Laboratory, Shenzhen, China) Shuqiang Yang (Harbin Institute of Technology, Shenzhen; Pengcheng Laboratory, Shenzhen, China) Xuan Wang (Harbin Institute of Technology, Shenzhen, China) Junbin Fang (Jinan University, China) |
A Practical Dynamic Enhanced BFT protocol Feng Shen (Shanghai Jiao Tong University, China) Yu Long (Shanghai Jiao Tong University, China) Zhen Liu (Shanghai Jiao Tong University, China) Zhiqiang Liu (Shanghai Jiao Tong University, China) Hongyang Liu (Shanghai Jiao Tong University, China) Dawu Gu (Shanghai Jiao Tong University, China) Ning Liu (Shanghai Jiao Tong University, China) |
Pre-adjustment Based Anti-collusion Mechanism for Audio Signals Juan Zhao (Deakin University, Australia) Tianrui Zong (Deakin University, Australia) Yong Xiang (Deakin University, Australia) Longxiang Gao (Deakin University, Australia) Gleb Beliakov (Deakin University, Australia) |
Detecting Intruders by User File Access Patterns Shou-Hsuan Huang (University of Houston, United States) Zechun Cao (University of Houston, United States) Calvin Raines (University of Houston, United States) Mai Yang (University of Houston, United States) Camille Simon (University of Houston, United States) |
Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture Xinshu Ma (Nanjing University of Aeronautics and Astronautics, China) Chunpeng Ge (Nanjing University of Aeronautics and Astronautics, China) Zhe Liu (Nanjing University of Aeronautics and Astronautics, China) |
Privacy Preserving Machine Learning with Limited Information Leakage Wenyi Tang (Renmin University of China, China) Bo Qin (Renmin University of China, China) Suyun Zhao (Renmin University of China, China) Boning Zhao (Renmin University of China, China) Yunzhi Xue (Institution of Software, Chinese Academy of Sciences, China) Hong Chen (Renmin University of China, China) |
Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained IoT Gabriel Jerome Solomon (Santa Clara University, United States) Peng Zhang (Shenzhen University, China) Yuhong Liu (Santa Clara University, United States) Rachael Brooks (Santa Clara University, United States) |
Sequential Aggregate MACs with Detecting Functionality Revisited Shingo Sato (Yokohama National University, Japan) Shoichi Hirose (University of Fukui, Japan) Junji Shikata (Yokohama National University, Japan) |
A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System view or update Li Zhang (Department of Information Security, Beijing Jiaotong University, China) Zhuo Lv (State Grid Henan Electric Power Research Institute, China) Xuesong Zhang (National Computer Network Emergency Response Technical Team/Coordination Center of China, China) Cen Chen (State Grid Henan Electric Power Research Institute, China) Nuannuan Li (State Grid Henan Electric Power Research Institute, China) Yidong Li (Department of Information Security, Beijing Jiaotong University, China) Wei Wang (Department of Information Security, Beijing Jiaotong University, China) |
EEG-based Authentication with Variational Universal Background Model Huyen Tran (University of Canberra, Australia) Dat Tran (University of Canberra, Australia) Wanli Ma (University of Canberra, Australia) Phuoc Nguyen (A2I2, Deakin University, Australia) |
An Efficient Vulnerability Detection Model for Ethereum Smart Contracts Jingjing Song (Beijing Jiaotong University, China) Haiwu He (iExec Blockchain Tech, China) Zhuo Lv (State Grid Henan Electric Power Research Institute, China) Chunhua Su (University of Aizu, China) Guangquan Xu (Tianjin University, China) Wei Wang (Beijing Jiaotong University, China) |
A Comparative Study on Network Traffic Clustering Yang Liu (Guangzhou University, China) Hanxiao Xue (Guangzhou University, China) Guocheng Wei (Guangzhou University, China) Lisu Wu (Guangzhou University, China) Yu Wang (Guangzhou University, China) Jin Li (Guangzhou University, China) |
Tell Them From Me: an Encrypted Application Profiler Mohammad Mamun (National Research Council Canada, Canada) Rongxing Lu (University of New Brunswick, Canada) Manon Gaudet (National Research Council Canada, Canada) |
Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP Juan Luo (Hunan University, China) Lei Yang (Hunan University, China) Chun Wang (Hunan University, China) Huan Zhao (Hunan University, China) |
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies Chen Pan (Shanghai Jiao Tong University, China) Shuyang Tang (Shanghai Jiao Tong University, China) Zhonghui Ge (Shanghai Jiao Tong University, China) Zhiqiang Liu (Shanghai Jiao Tong University, China) Yu Long (Shanghai Jiao Tong University, China) Zhen Liu (Shanghai Jiao Tong University, China) Dawu Gu (Shanghai Jiao Tong University, China) |
Difficulty of decentralized structure due to rational user behavior on blockchain Mitsuyoshi Imamura (University of Tsukuba, Japan) Kazumasa Omote (University of Tsukuba, Japan) |
A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration Jiacheng Zhang (Xidian University, Xi'an; Science and Technology on Communication Networks Laboratory, Shijiazhuang 050081, China, China) Li Yang (Xidian University, Xi’an, China, China) Shui Yu (School of computer science, University of Technology Sydney, Australia, Australia) Jianfeng Ma (Xidian University, Xi’an, China, China) |
Cryptanalysis of Raindrop and FBC Bingqing Ren (Central China Normal University, China) Jiageng Chen (Central China Normal University, China) Shihao Zhou (Central China Normal University, China) Xiushu Jin (Central China Normal University, China) Zhe Xia (Wuhan University of Technology, China) Kaitai Liang (University of Surrey, United Kingdom) |
Attribute Based Encryption with Publicly Verifiable Outsourced Decryption Hui Zheng (Zhejiang Gongshang University, China) Jun Shao (Zhejiang Gongshang University, China) Guiyi Wei (Zhejiang Gongshang University, China) Li Hu (Guangzhou University, China) Bianjing Pan (Zhejiang Gongshang University, China) Kai Liu (Zhejiang Gongshang University, China) Xiaohang Mao (Zhejiang Gongshang University, China) |
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost Rongxin Zheng (Zhejiang Gongshang University, China) Cuiwen Ying (Zhejiang Gongshang University, China) Jun Shao (Zhejiang Gongshang University, China) Guiyi Wei (Zhejiang Gongshang University, China) Hongyang Yan (Guangzhou Univesity, China) Jianmin Kong (Zhejiang Gongshang University, China) Yekun Ren (Zhejiang Gongshang University, China) Hang Zhang (Zhejiang Gongshang University, China) Weiguang Hou (Zhejiang Gongshang University, China) |
Lattice based verifiably encrypted double authentication preventing signatures Jinhui Liu (shaanxi normal university, China) Yong Yu (shaanxi normal university, China) |
Privacy-Preserving Sequential Data Publishing Huili Wang (Xidian University,State Key Laboratory of Integrated Services Networks, China) Wen Ping Ma (Xidian University, China) Haibin Zheng (Beihang University, China) Zhi Liang (Beihang University, China) Qianhong Wu (Beihang University, China) |
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter Kang Li (Research Institute for Sustainable Urban Development,Department of Computing,The Hong Kong Polytechnic University, Hong Kong) Wang Fat Lau (Department of Computing,The Hong Kong Polytechnic University, Hong Kong) Man Ho Au (Department of Computing,The Hong Kong Polytechnic University, Hong Kong) |
Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks Yao Cheng (Huawei International, Singapore) Cheng-Kang Chu (Huawei International, Singapore) Hsiao-Ying Lin (Huawei International, Singapore) Marius Lombard-Platet (École Normale Supérieure de Paris, France) David Naccache (École Normale Supérieure de Paris, France) |
SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform Sibghat Bazai (Massey University, New Zealand) Julian Jang-Jaccard (Massey University, New Zealand) |
Using Sparse Composite Document Vectors to Classify VBA Macros Mamoru Mimura (National Defense Academy, Japan) |
An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol Ou Ruan (Hubei University of Technology, China) Yang Yang (Hubei University of Technology, China) Mingwu Zhang (Hubei University of Technology, China) |
A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications Xu Wang (Global Big Data Technologies Centre, University of Technology Sydney, Australia, Australia) Ping Yu (GBDTC, UTS, Australia; State Key Laboratory of Networking and Switch Technology, BUPT, China, China) Guangsheng Yu (Global Big Data Technologies Centre, University of Technology Sydney, Australia, Australia) Xuan Zha (GBDTC, UTS, Australia; China Academy of Information and Communications Technology, Beijing, China, China) Wei Ni (CSIRO, Australia) Ren Ping Liu (Global Big Data Technologies Centre, University of Technology Sydney, Australia, Australia) Y. Jay Guo (Global Big Data Technologies Centre, University of Technology Sydney, Australia, Australia) |
A Muti-attributes-based Trust Model of Internet of Vehicle Wei Ou (Hunan University of Science and Engineering, China) Entao Luo (Hunan University of Science and Engineering, China) Zhiyuan Tan (Edinburgh Napier University, United Kingdom) |
Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices Maharage Nisansala Perera (Advanced Telecommunications Research Institute International, Japan) Toru Nakamura (Advanced Telecommunications Research Institute International, Japan) Masayuki Hashimoto (Advanced Telecommunications Research Institute International, Japan) Hiroyuki Yokoyama (Advanced Telecommunications Research Institute International, Japan) |
Privacy-preserving k-means clustering: an application to driving style recognition Othmane El Omri (IRT-SystemX, France) Aymen Boudguiga (CEA-LIST, France) Malika Izabachene (CEA-LIST, France) Witold Klaudel (Renault, France) |
Derandomized PACE with Mutual Authentication Miroslaw Kutylowski (Wroclaw University of Science and Technology, Poland) Adam Bobowski (Wrocław University of Science and Technology, Poland) |