Ihre Browserversion ist veraltet. Wir empfehlen, Ihren Browser auf die neueste Version zu aktualisieren.

 Please find the Programme under 



Pricom 2018

The 4th International Symposium on Privacy Computing


Aug. 6th ~ Aug. 8th, 2018

Boppard, Germany



For Your Information


            Registration is scheduled on Aug. 6th from 14:00 to 18:00 at the Ebertor Hotel, Boppard, Germany.

Symposium Venue

             The Symposium will be held at the Ebertor Hotel, as shown in the figure below;



Name Badge

            Participants are requested to wear the name badge all time during the symposium coffee break, lunch, welcome reception and             dinner.



            Welcome dinner, Tour and Conference Banquet are open to all conference participants.

            Reception Dinner: 6th August. 2018, 18:00 on board

            Banquet: 7th August 2018, the place to be announced

            Social activity: 8th August 2018, 9:00-17:30


Contact during the symposium

            Wolf Hartman Riebe +49 (0) 15234176231

            Juan Mei +49 (0) 17634066963


         Program of PriCom2018

Ebertor Hotel, 6.-8. August 2018, Boppard, Germany



Monday, 6 Aug. 2018

14:00-18:00 Registration at the Ebertor Hotel

18:00 Reception Dinner on board

Tuesday, 7 Aug. 2018

08:45-09:00 Opening Ceremony

09:00-10:00 Session 1: Invited Speaker, Chair: Zhong Li

  • CXXX, Prof. Shujun Li (University of Kent, England)

10:00-10:30 Tea Break

10:30-11:30 Invited Speaker, Chair: Jianfeng Ma

  • Chaos Control and its applications, Prof. Zhong Li (FernUniversität in Hagen, Germany)

12:00-13:00 Lunch

13:45-15:10 Chair: Zhong Li

  • 13:45-14:25: A Personalized k-anonymity based Scheme for Mobile Users in Location-Based Services, Fenghua Liļ¼ˆInstitute of Information Engineering, Chinese Academy of Sciences)
  • 14:25-15:10: Secure Numeric-Related SQL Processing in Cloud Databases under Multiple Keys, Jianfeng Ma, Yulong Shen (Xidian University)

15:10-15:30 Tea Break

15:30-17:20 Chair: Weidong Qiu

  • 15:30-16:10: Privacy Preserving Data Sharing Scheme in Content Centric Networks, Hui Li (Xidian University)
  • 16:10-16:50: A Software-Defined Framework for Deploying Dynamic Network Security Policies, Deqing Zou (Huazhong University of Science and Technology)
  • 16:50-17:30: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields Privacy-Protection mutual Authentication and Key Agreement Scheme for D2D Communications in LTE-A Network, Jin Cao (Xidian University)

18:00-20:00: Conference Banquet (Le Chopin im Bellevue Rheinhotel)

Wednesday, 8 Aug. 2018

08:30-09:50, Chair: Fenghua Li

  • 08:30-09:10: Assessing Privacy Risks for Applications on Smartphone, Zheng Wang (Hangzhou Dianzi University).
  • 09:10-09:50: An Up-to-Date Overview of Consumer Privacy Mining Algorithms in Smart Grid, Zijian Zhang (Beijing Institute of Technology)

09:50-10:10 Tea Break

10:10-12:00 Chair: Deqing Zou

  • 10:10-10:40:Resolving Privacy Conflicts in Online Social Network: a Bargaining-based Incentive Approach, Lihua Yin (Guangzhou University)
  • 10:40-11:20: Privacy protection for Machine Type Communications via Bulk Signaling Handling, Yueyu Zhang (Xidian University)
  • 11:20-12:00: A Model for Detecting Network Attacks Based on Deep Learning, Huijuan Lian, Jie Guo (Shanghai Jiao Tong University)

12:00-13:30 Lunch

13:30-14:50 Chair: Weidong Qiu

  • 13:30-14:10: A Gameing Theoretic Framework for Defending Against Memcached based Reflection Distributed Denial-of-Service Attacks, Zizhong Tian (Guangzhou University)
  • 14:10-14:50: A Joint-Entropy Based Mix-zone Scheme for Protecting Location Privacy in Internet of Vehicles, Xia Feng, Liangmin Wang (Jiangsu University)

14:50-15:10 Tea Break

15:10-17:40 Chair: Yulong Shen

  • 15:10-15:40: Enabling Practical Multi-keyword Ranked Search Based on BM25 over Encrypted Cloud Data, Xiangyu Wang (Xidian University)
  • 15:40-16:20: Cryptanalysis of an Image Encryption Algorithm Based on Information Entropy, Chengqing Li (Hunan University)
  • 16:20-17:00: Cryptanalysis of an Image Encryption Algorithm Based on Information Entropy, Chengqing Li (Hunan University)
  • 17:00-17:40: A privacy-preserving authentication protocol for wireless e-health system, Xiaosong Zhang (
  •  University of Electronic Science and Technology)

17:40-18:00 Closing