Accepted Papers
Regular papers(page limit 8 pages): 14 papers
-
An Identity Management System using Group Signatures with Message-Dependent Opening
Yuto Imura and Keita Emura -
Bit-Based MILP Modelling of Non-Bit-Permutation Linear Layers for Linear Cryptanalysis
Abhilash Das -
Linear Retention Convolutional Network for Few-shot Network Threat Detection
Yong Ding, Zhi Li, Changsong Yang, Hai Liang, Siyuan Jia and Zhenyu Li -
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications
Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi Yuan Liu and You-Qian Chen -
Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authentication Key Exchange Protocol Using Bi-ISIS
Hao-Yi Hsu, Hsin-Yi Lin, Rayling Tso, Tao-Hsiang Chang and Jen-Chieh Hsu -
A Study of Fully Homomorphic Encryption with Evaluation Control
Kenneth-Kuan-Phing Ong, Bo-Yu Chen, Po-Wen Chi and Chao Wang -
Evading IoT Intrusion Detection Systems with GAN
Mariama Mbow, Rodrigo Román, Takeshi Takahashi and Kouichi Sakurai -
An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection
Chao Fei, Nian Xia, Pang-Wei Tsai, Yang Lu, Xiaonan Pan and Junli Gong -
Pairing based Multisignature with Message Flexibility
Kodai Hayashida and Atsuko Miyaji -
Secure and Portable Anonymous Credentials without Tamper-Resistant Hardware
Tianshu Yu and Kunpeng Bai -
Proposal for Key-Value Commitments with offline batch update
Toshiyuki Mineta, Atsuko Miyaji and Hideaki Miyaji -
Consideration on Defining Field for Efficient Ring-LWE
Rintaro Yamada, Shinya Okumura and Atsuko Miyaji -
Backdoored-input Detection by Trigger Embedding
Akira Fujimoto, Shintaro Yamashita, Yuntao Wang and Atsuko Miyaji -
Color Image Steganography with Authentication via Scalable Index Encoding
Min-Yu Liang, Yun-Chieh Chang and Jason Lin
Short papers(page limit 6 pages): 7 papers
-
A Pull Firmware Update Mechanism for Industrial Control Based on IOTA Stream
Iuon-Chang Lin and Ling Bo -
Improving the Performance of IIoT Intrusion Detection System Using Hybrid Synthetic Data
Chia-Mei Chen, Chi-Hsuen Hsu, Zheng-Xun Cai, Gu-Hsin Lai and Ya-Hui Ou -
The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples
Shuhei Ippa, Takao Okubo and Masaki Hashimoto -
Pairing-Free Identity-Based Encryption with Security Against the KGC
Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang and Yu-Hsuan Chang -
Security requirements for fully automated AI systems to exercise and ensure the rights of data subjects
Junhyung Park, Gunsang You, Yeontae Ji and Heung Youl Youm -
CCADM: a Continuous Collection scheme for Anonymous Data Management
Yun-Hsin Chuang, Po-Wen Chi and Ming-Hung Wang -
Adaptive Machine Learning Model For Dynamic Field Selection
Yu Chi Lin and Po-Wen Chi