22nd Oct 2017 (1st Floor, Jiyuan Hotel) |
14:00-22:00 |
Registration |
Lobby of Jiyuan International Hotel |
23rd Oct 2017 AM (Jirui Hall, 1st Floor, Jiyuan Hotel) |
8:30-9:30 |
Opening and Group Photo Chair: Hui Li |
1. Opening Address 2. Introduction of ProvSec 2017 Submissions 3. Introduction of CSS 2017 Submissions 4. Group Photo |
Keynote Speech Session Chair: Tatsuaki Okamoto |
9:30-10:30 |
Title: Computations on Encrypted Data and Privacy Speaker: David Pointcheval |
10:30-10:50 |
Tea Break |
Invited Talk 1 Session Chair: Yang Xiang |
10:50-11:40 |
Title: Location Privacy and its Applications Speaker: Wanlei Zhou, Tianqing Zhu |
Invited Talk 2 Session Chair: Yong Yu |
11:40-12:30 |
Title: Digital Signatures with Tight Reductions Speaker: Willy Susilo |
12:30-14:00 |
Lunch Buffet (8th Floor, Jiyuan Hotel) |
23rd Oct 2017 PM (Wenyuan Hall, 5th Floor, Jiyuan Hotel) |
Session 1. Session Chair: Tom Luan |
14:00-14:20 |
Detection of lurkers in On-line Social Networks Flora Amato, Aniello Castiglione, Vincenzo Moscato, Antonio Picariello and Giancarlo Sperlì. |
14:20-14:40 |
IP Geolocation Base on Local Delay Distribution Similarity Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu and Fenlin Liu. |
14:40-15:00 |
An Online Approach to Defeating Return-Oriented-Programming Attacks Donghai Tian. |
15:00-15:20 |
Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy Yu Yao, Qiang Fu, Chuan Sheng and Wei Yang. |
15:20-15:40 |
A Fair Three-party Contract Singing Protocol Based on Blockchain Hui Huang, Kuan-Ching Li and Xiaofeng Chen. |
15:40-16:00 |
Tea Break |
Session 2. Session Chair: Tianqing Zhu |
16:00-16:20 |
Protecting in-memory data cache with secure enclaves in untrusted cloud Yuxia Cheng. |
16:20-16:40 |
Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service Xingwen Zhao and Hui Li. |
16:40-17:00 |
Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu and Junjie Zeng. |
17:00-17:20 |
Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone Yun Zhou, Alexander Raake, Tao Xu and Xuyun Zhang. |
17:20-17:40 |
An Anonymization Method to Improve Data Utility for Classification Jianmin Han, Juan Yu, Jianfeng Lu, Hao Peng and Jiandang Wu. |
17:40-18:00 |
Securely Outsourcing Decentralized Multi-authority Attribute Based Signature Sun Jiameng, Qin Jing and J Ma. |
18:30 |
Banquet (Jirui Hall, 1st Floor, Jiyuan Hotel) |