{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:05:16Z","timestamp":1772823916805,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031455124","type":"print"},{"value":"9783031455131","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45513-1_3","type":"book-chapter","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T22:01:53Z","timestamp":1696975313000},"page":"44-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Signcryption-Based Encrypted Traffic Detection Scheme for\u00a0Fast Establishing Secure Connections"],"prefix":"10.1007","author":[{"given":"Hao","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Fagen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lihui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Xiaoli","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,11]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s11416-017-0306-6","volume":"14","author":"B Anderson","year":"2018","unstructured":"Anderson, B., Paul, S., McGrew, D.: Deciphering malware\u2019s use of TLS (without decryption). J. Comput. Virol. Hacking Techniques 14, 195\u2013211 (2018). https:\/\/doi.org\/10.1007\/s11416-017-0306-6","journal-title":"J. Comput. Virol. Hacking Techniques"},{"key":"3_CR2","unstructured":"Cisco: 2018 Annual Cybersecurity Report: The evolution of malware and rise of artificial intelligence, https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-reports.html. Accessed 22 Jul 2019"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"De Caro, A., Iovino, V.: jPBC: Java pairing based cryptography. In: 2011 IEEE Symposium On Computers And Communications (ISCC), pp. 850\u2013855. IEEE (2011). https:\/\/doi.org\/10.1109\/ISCC.2011.5983948","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"42805","DOI":"10.1109\/ACCESS.2019.2963233","volume":"8","author":"N Deng","year":"2019","unstructured":"Deng, N., Deng, S., Hu, C., Lei, K.: An efficient revocable attribute-based signcryption scheme with outsourced unsigncryption in cloud computing. IEEE Access 8, 42805\u201342815 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2963233","journal-title":"IEEE Access"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., et al.: The security impact of HTTPS interception. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23456"},{"key":"3_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101653","volume":"102","author":"N Eltayieb","year":"2020","unstructured":"Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Architect. 102, 101653 (2020). https:\/\/doi.org\/10.1016\/j.sysarc.2019.101653","journal-title":"J. Syst. Architect."},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Gorbunov, S., Vaikuntanathan, V., Wichs, D.: Leveled fully homomorphic signatures from standard lattices. In: Proceedings of the Forty-seventh Annual ACM symposium on Theory of Computing, pp. 469\u2013477 (2015). https:\/\/doi.org\/10.1145\/2746539.2746576","DOI":"10.1145\/2746539.2746576"},{"key":"3_CR8","unstructured":"Grubbs, P., et al.: Pancake: Frequency smoothing for encrypted data stores. In: Usenix Security (2020)"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s12243-012-0296-9","volume":"67","author":"SH Islam","year":"2012","unstructured":"Islam, S.H., Biswas, G.: A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Annals of t\u00e9l\u00e9communications-annales des telecommunications 67, 547\u2013558 (2012). https:\/\/doi.org\/10.1007\/s12243-012-0296-9","journal-title":"Annals of t\u00e9l\u00e9communications-annales des telecommunications"},{"issue":"13","key":"3_CR10","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1002\/sec.1165","volume":"8","author":"SH Islam","year":"2015","unstructured":"Islam, S.H., Khan, M.K., Al-Khouri, A.M.: Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Security Commun. Netw. 8(13), 2214\u20132231 (2015). https:\/\/doi.org\/10.1002\/sec.1165","journal-title":"Security Commun. Netw."},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1360\/SSI-2021-0280","volume":"52","author":"Z Jianjin","year":"2022","unstructured":"Jianjin, Z., Qi, L., Shengli, L., Yanqing, Y., Yueping, H.: Towards traffic supervision in 6g: a graph neural network-based encrypted malicious traffic detection method. SCIENTIA SINICA Inform. 52, 270\u2013286 (2022). https:\/\/doi.org\/10.1360\/SSI-2021-0280","journal-title":"SCIENTIA SINICA Inform."},{"issue":"6","key":"3_CR12","doi-asserted-by":"publisher","first-page":"10431","DOI":"10.1109\/JIOT.2019.2939204","volume":"6","author":"A Karati","year":"2019","unstructured":"Karati, A., Fan, C.I., Hsu, R.H.: Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained iot devices. IEEE Internet Things J. 6(6), 10431\u201310440 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2939204","journal-title":"IEEE Internet Things J."},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Kim, J., Camtepe, S., Baek, J., Susilo, W., Pieprzyk, J., Nepal, S.: P2DPI: practical and privacy-preserving deep packet inspection. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, pp. 135\u2013146 (2021). https:\/\/doi.org\/10.1145\/3433210.3437525","DOI":"10.1145\/3433210.3437525"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Lacharit\u00e9, M.S., Paterson, K.G.: Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. Cryptology ePrint Archive (2017)","DOI":"10.46586\/tosc.v2018.i1.277-313"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Naylor, D., Finamore, A., Leontiadis, I., Grunenberger, Y., Mellia, M., Munaf\u00f2, M.: The cost of the \"s\" in https. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, pp. 133\u2013140 (2014). https:\/\/doi.org\/10.1145\/2674005.2674991","DOI":"10.1145\/2674005.2674991"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-58951-6_1","volume-title":"Computer Security \u2013 ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I","author":"J Ning","year":"2020","unstructured":"Ning, J., et al.: Pine: enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) Computer Security \u2013 ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I, pp. 3\u201322. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_1"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Ning, J., Poh, G.S., Loh, J.C., Chia, J., Chang, E.C.: Privdpi: Privacy-preserving encrypted traffic inspection with reusable obfuscated rules. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1657\u20131670 (2019). https:\/\/doi.org\/10.1145\/3319535.3354204","DOI":"10.1145\/3319535.3354204"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"D Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387\u2013398. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_33"},{"key":"3_CR19","doi-asserted-by":"publisher","unstructured":"Radivilova, T., Kirichenko, L., Ageyev, D., Tawalbeh, M., Bulakh, V.: Decrypting SSL\/TLS traffic for hidden threats detection. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), pp. 143\u2013146. IEEE (2018). https:\/\/doi.org\/10.1109\/DESSERT.2018.8409116","DOI":"10.1109\/DESSERT.2018.8409116"},{"key":"3_CR20","unstructured":"Roccia, T.: Malware packers use tricks to avoid analysis, detection. McAfee Blogs (2017)"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Sherry, J., Lan, C., Popa, R.A., Ratnasamy, S.: Blindbox: Deep packet inspection over encrypted traffic. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 213\u2013226 (2015). https:\/\/doi.org\/10.1145\/2785956.2787502","DOI":"10.1145\/2785956.2787502"},{"key":"3_CR22","unstructured":"Snort: Snort rules. https:\/\/www.snort.org\/ Accessed 12 Mar (2022)"},{"key":"3_CR23","unstructured":"Symantec: Four pillars of integrated cyber defense. https:\/\/www.broadcom.com\/products\/cyber-security Accessed 11 Apr 2021"},{"issue":"5","key":"3_CR24","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1353-4858(19)30059-5","volume":"2019","author":"O Yaacoubi","year":"2019","unstructured":"Yaacoubi, O.: The rise of encrypted malware. Netw. Secur. 2019(5), 6\u20139 (2019). https:\/\/doi.org\/10.1016\/S1353-4858(19)30059-5","journal-title":"Netw. Secur."},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Zhang, H., Papadopoulos, C., Massey, D.: Detecting encrypted botnet traffic. In: 2013 Proceedings IEEE INFOCOM, pp. 3453\u20131358. IEEE (2013). https:\/\/doi.org\/10.1109\/INFCOM.2013.6567180","DOI":"10.1109\/INFCOM.2013.6567180"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Kang, C., Xiong, G., Li, Z.: Deep forest with LRRS feature for fine-grained website fingerprinting with encrypted SSL\/TLS. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management, pp. 851\u2013860 (2019). https:\/\/doi.org\/10.1145\/3357384.3357993","DOI":"10.1145\/3357384.3357993"},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) $$\\ll $$ cost (signature) + cost (encryption). In: Advances in Cryptology-CRYPTO\u201997: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17\u201321, 1997 Proceedings 17, pp. 165\u2013179. Springer (1997). https:\/\/doi.org\/10.1007\/bfb0052234","DOI":"10.1007\/bfb0052234"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45513-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:02:46Z","timestamp":1696982566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45513-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031455124","9783031455131"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45513-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2023.github.io\/ProvSec2023\/#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}