{"title":"Efficient and Privacy-Preserving Ride Matching over Road Networks against Malicious ORH server","authors":"Mingtian Zhang, Anjia Yang, Jian Weng, Min-Rong Chen, Huang Zeng, Yi Liu, Xiaoli Liu, Zhihua Xia","doi":"10.1109/tifs.2025.3544453","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544453","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143495479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-24DOI: 10.1109/tifs.2025.3544957
Bichen Kang, Neng Ye, Jianping An
{"title":"Achieving Positive Rate of Covert Communications Covered by Randomly Activated Overt Users","authors":"Bichen Kang, Neng Ye, Jianping An","doi":"10.1109/tifs.2025.3544957","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544957","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"32 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143486224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-21DOI: 10.1109/tifs.2025.3544490
Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang
{"title":"Post-Quantum Rollup: Falcon Signature Aggregation Based on SNARG with Enhanced Gates","authors":"Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang","doi":"10.1109/tifs.2025.3544490","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544490","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"2018 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143470580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-21DOI: 10.1109/tifs.2025.3544485
Marc Dib, Samuel Pierre
{"title":"HSM-Based Architecture to Detect Insider Attacks on Server-Side Data","authors":"Marc Dib, Samuel Pierre","doi":"10.1109/tifs.2025.3544485","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544485","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143470583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-20DOI: 10.1109/tifs.2025.3544034
Ximing Fu, Mo Li, Qingming Zeng, Tianyang Li, Shenghao Yang, Yonghui Guan, Chuanyi Liu
{"title":"Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol","authors":"Ximing Fu, Mo Li, Qingming Zeng, Tianyang Li, Shenghao Yang, Yonghui Guan, Chuanyi Liu","doi":"10.1109/tifs.2025.3544034","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544034","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-20DOI: 10.1109/tifs.2025.3544072
Zhenhua Chen, Kaili Long, Junrui Xie, Qiqi Lai, Yilei Wang, Ni Li, Luqi Huang, Aijun Ge
{"title":"A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms","authors":"Zhenhua Chen, Kaili Long, Junrui Xie, Qiqi Lai, Yilei Wang, Ni Li, Luqi Huang, Aijun Ge","doi":"10.1109/tifs.2025.3544072","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544072","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"18 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can We Trust the Similarity Measurement in Federated Learning?","authors":"Zhilin Wang, Qin Hu, Xukai Zou, Pengfei Hu, Xiuzhen Cheng","doi":"10.1109/tifs.2024.3516567","DOIUrl":"https://doi.org/10.1109/tifs.2024.3516567","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-20DOI: 10.1109/tifs.2025.3544066
Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
{"title":"HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables","authors":"Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos","doi":"10.1109/tifs.2025.3544066","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544066","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}