Skip to main content
  • Conference proceedings
  • © 2019

Science of Cyber Security

Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11933)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SciSec: International Conference on Science of Cyber Security

Conference proceedings info: SciSec 2019.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Blockchain, Attack and Defense

    1. Behavior Flow Graph Construction from System Logs for Anomaly Analysis

      • Hang Ling, Jing Han, Jiayi Pang, Jianwei Liu, Jia Xu, Zheng Liu
      Pages 215-223
  2. Encryption and Application

    1. Front Matter

      Pages 233-233
    2. Effective Matrix Factorization for Recommendation with Local Differential Privacy

      • Hao Zhou, Geng Yang, Yahong Xu, Weiya Wang
      Pages 235-249
    3. FDIA-Identified Overloaded Power Lines

      • Da-Tian Peng, Jianmin Dong, Qinke Peng, Bo Zeng, Zhi-Hong Mao
      Pages 262-277
    4. Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints

      • Wang Shao-Hui, Zhang Yan-Xuan, Ke Chang-Bo, Xiao Fu, Wang Ru-Chuan
      Pages 278-292
    5. Towards Realizing Authorized Encrypted Search with Designed Access Policy

      • Lin Mei, Chungen Xu, Lei Xu, Zhongyi Liu, Xiaoling Yu, Zhigang Yao
      Pages 293-307
    6. Forward Private Searchable Encryption with Conjunctive Keywords Query

      • Zhigang Yao, Chungen Xu, Lei Xu, Lin Mei
      Pages 308-322
    7. PAFR: Privacy-Aware Friends Retrieval over Online Social Networks

      • Yuxi Li, Fucai Zhou, Zifeng Xu
      Pages 323-338
    8. Implicit-Key Attack on the RSA Cryptosystem

      • Mengce Zheng, Honggang Hu
      Pages 354-362
    9. High-Efficiency Triangle Counting on the GPU

      • Yang Wu, Shikang Yu, Yurong Song, Guoping Jiang, Xiao Tu
      Pages 363-370
    10. A New Pairing-Free Certificateless Signature Scheme for Internet of Things

      • Zhenchao Zhang, Yali Liu, Xinchun Yin, Xincheng Li
      Pages 371-379
  3. Back Matter

    Pages 381-382

Other Volumes

  1. Science of Cyber Security

About this book

This book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019.

The 20 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 62 submissions.
These papers cover the following subjects: Artificial Intelligence for Cybersecurity, Machine Learning for Cybersecurity, and Mechanisms for Solving Actual Cybersecurity Problems (e.g., Blockchain, Attack and Defense; Encryptions with Cybersecurity Applications). 

Editors and Affiliations

  • Institute of Information Engineering and School of Cybersecurity, University of Chinese Academy of Sciences, Beijing, China

    Feng Liu

  • Nanjing University of Posts and Telecommunications, Nanning, China

    Jia Xu

  • Department of Computer Science, The University of Texas at San Antonio, San Antonio, USA

    Shouhuai Xu

  • Google and Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access