Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Xincheng Yan, Yue Chen, Yuchang Zhai, Yang Ba, Xuewei Li, Hongyong Jia |
An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 116-125, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yong Wang, Mengge Zhang, Zhengyu Zhu |
Detection of Voice Transformation Disguise Based on Deep Residual Net. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 126-130, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Nghia Duong-Trung, Ha Xuan Son, Hai Trieu Le, Tan Tai Phan |
On Components of a Patient-centered Healthcare System Using Smart Contract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 31-35, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Chengwei Ai, Weiyu Dong, Zicong Gao |
A Novel Concolic Execution Approach on Embedded Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 47-52, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ping Wang, Jinjiang Yang, Min Zhu 0001, Bo Liu 0019 |
A High-throughput Low-area Entropy Source Based on Asynchronous Feedback Unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 131-135, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yonghao Wang |
A Trust Management Model for Internet of Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 136-140, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Pansilu Pitigalaarachchi, Chandana Gamage |
Efficiency Enhancements for Practical Techniques for Searches on Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 13-18, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shixuan Wang, Jiabin Yuan, Shudi Chen |
Quality-based Score Level Fusion for Continuous Authentication with Motion Sensor and Face. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 58-62, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zhouping Cui, Weihai Li, Chaohai Yu, Nenghai Yu |
A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 68-73, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zhongxin Yang, Zhifeng Chen, Ping Zhang, Ming Liu, Qingbao Li |
An Information Intelligent Search Method for Computer Forensics Based on Text Similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 79-83, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Nghia Duong-Trung, Ha Xuan Son, Hai Trieu Le, Tan Tai Phan |
Smart Care: Integrating Blockchain Technology into the Design of Patient-centered Healthcare Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 105-109, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | |
ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![ACM, 978-1-4503-7744-7 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Martin Ocenas, Ivan Homoliak, Petr Hanácek, Kamil Malinka |
Security and Encryption at Modern Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 19-23, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hongman Wang, Yongbin Yuan, Fangchun Yang |
A Personal Data Determination Method Based On Blockchain Technology and Smart Contract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 89-94, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hui Chen |
Quantum Relay Blockchain and Its Applications in Key Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 95-99, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tao Chen, Guangming Zhou, Zhangpu Liu, Tao Jing |
A Novel Ensemble Anomaly based Approach for Command and Control Channel Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 74-78, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jing Chen, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Xingkai Wang |
Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 24-30, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shuangbao Wang 0001, Matthew Rohde, Amjad Ali 0008 |
Quantum Cryptography and Simulation: Tools and Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 36-41, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Enmei Lai, Wenjun Luo |
Static Analysis of Integer Overflow of Smart Contracts in Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 110-115, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jian Lin 0007, Liehui Jiang, Chengwei Ai, Shihong Chao |
A Shape-inference-based Approach to Enhance Constraint Independence Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 141-145, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Wei Ding 0001, Zidong Hua, Panhui Li, Qiushi Gong, Yuxi Cheng |
Botnet Host Detection Based on Heartbeat Association. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 42-46, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Gang Zhao 0004, Hui He, Bingbing Di |
Design and Implementation of the Digital Education Resources Authentication System Based on Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 100-104, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Quanmin Wang, Xuan Wei |
The Detection of Network Intrusion Based on Improved Adaboost Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 84-88, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kunyu Liu, Liang Zhou 0003 |
Routing Authentication Chain Mechanism to Resist AODV Black Hole Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 53-57, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Fukang Liu, Guorui Wu, Yang Liu 0039 |
A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 63-67, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lianxiao Meng, Shuangyin Ren, Gaigai Tang, Chao Yang, Wu Yang 0001 |
UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 146-151, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zedong Sun, Chunxiang Gu, Yonghui Zheng |
Block Sieve Reduction: A New Random Sampling Reduction Algorithm Based on Sieve Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 1-5, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yihong Long 0001, Feng Xiong |
Secret Sharing Based BLMQ Signature Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020, pp. 6-12, 2020, ACM, 978-1-4503-7744-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Nurul Nadia Che Saufi, Nur Shuhadah Mohd Ab Razak, Hafizah Mansor |
"FoRent: vehicle forensics for car rental system". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 153-157, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Li, Di Xu, Yanning Zhang |
Real walking on a virtual campus: a VR-based multimedia visualization and interaction system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 261-266, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Weichen Lu, Anyong Qing, Ching Kwang Lee |
Single image super-resolution using fast sensing block. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 256-260, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Golam Shams Rabbani, Sharmin Sultana, Md. Nazmul Hasan, Salem Quddus Fahad, Jia Uddin |
Person identification using SURF features of dental radiograph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 196-200, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ferdousi Rahman, Israt Jahan Ritun, Nafisa Farhin, Jia Uddin |
An assistive model for visually impaired people using YOLO and MTCNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 225-230, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jerome P. Songcuan, Ariel M. Sison |
Jumbled passsteps: a hotspot guessing attack resistant graphical password authentication scheme based on the modified passmatrix method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 55-59, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ha Xuan Son, Nguyen Minh Hoang |
A novel attribute-based access control system for fine-grained privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 76-80, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Chia-Yu Huang, Hahn-Ming Lee, Jiunn-Chin Wang, Ching-Hao Mao |
Identifying HID-based attacks through process event graph using guilt-by-association analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 273-278, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yulin Wang, Chin-Chen Chang 0001 (eds.) |
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![ACM, 978-1-4503-6618-2 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ying Yang, Zheng Song |
LBACWeb: a lattice-based access control model for mobile thin client based on web OSes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 103-109, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Venkatesh, Ananda Kumar Subramanian |
Dead-end free geographic routing protocol for WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 279-283, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ranbir Singh Bali, Fehmi Jaafar, Pavol Zavarsky |
Lightweight authentication for MQTT to improve the security of IoT communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 6-12, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xiyu Wang, Heng-Jian Li, Jian Qiu, Changzhi Yu |
Palm vein recognition based on competitive code and DPL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 179-183, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | YouXuan Li, Kien Tsong Chau, ZiHan Wei, QiBin Kang |
A comparative study on two XML editors (oxygon and ultraedit). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 284-287, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Suhail Hamdan, Yohei Fukumizu, Tomonori Izumi, Hironori Yamauchi |
Improved face image super-resolution with restricted patch-searching area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 184-190, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yihan Jiang, Yong Li 0002, Yan Zhu 0010 |
Auditable zerocoin scheme with user awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 28-32, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shuangxi Chen, Xiahui Xu, Chunming Wu 0001, Xinyue Jiang |
Research on executive control strategy of mimic web defense gateway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 148-152, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Enrique G. Abad, Ariel M. Sison |
Enhanced key generation algorithm of hashing message authentication code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 44-48, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | G. Manjula, M. Shivakumar, Y. V. Geetha |
Adaptive optimization based neural network for classification of stuttered speech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 93-98, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nguyen Minh Hoang, Ha Xuan Son |
A dynamic solution for fine-grained policy conflict resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 116-120, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed M. Alani |
Applications of machine learning in cryptography: a survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 23-27, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dara Sinclair, Hossain Shahriar, Chi Zhang 0028 |
Security requirement prototyping with hyperledger composer for drug supply chain: a blockchain application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 158-163, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Daniel A. Neri, Ruji P. Medina, Ariel M. Sison |
An XBOX-based key generation technique for vigenere algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 66-70, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mark Jeremy G. Narag, Maricor N. Soriano |
Identifying the painter using texture features and machine learning algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 201-205, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shiny Rajendrakumar, V. K. Parvati, Rajashekarappa, Parameshachari Bidare Divakarachari |
Automation of irrigation system through embedded computing technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 289-293, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ziaeddin Nazari, Morteza Noferesti, Rasool Jalili |
DSCA: an inline and adaptive application identification approach in encrypted network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 39-43, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Fang Miao, Wenjie Fan, Wenhui Yang, Yan Xie |
The study of data-oriented and ownership-based security architecture in open internet environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 121-129, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yu Xiong, Jiang Du |
Electronic evidence preservation model based on blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 1-5, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yi Xie 0005, Wenjia Ding, Yulin Wang |
Detection and localization of image tamper with scalable granularity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 216-219, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zhang, Kien Tsong Chau, Jingfang Xu, CuiTing Liu |
An investigation into the attractiveness level of commercial website for visitors: a case study on 66rpg website. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 99-102, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Wenchuan Yang, Zishuai Cheng, Baojiang Cui |
Recombining TCP sessions based on finite state machine to detect cyber attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 138-142, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xuesong Lu, Xiangan Chen, Wei Li, Yuchuan Qiao |
Graph cut segmentation of the right ventricle in cardiac MRI using multi-scale feature learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 231-235, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hussain Aldawood, Geoffrey Skinner |
An academic review of current industrial and commercial cyber security social engineering solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 110-115, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | En Chen, Tzren-Ru Chou |
Spectral reflectance recovery of various materials based on linear interpolation with nonparametric metameric spectra of extreme points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 247-255, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Suriani Ab Rahman, Marcella Peter, Jacey-Lynn Minoi, Hamimah Ujir |
Multiway analysis for face recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 191-195, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | S. M. Nazia Fathima, Tamilselvi Rajendran, M. Parisa Beham |
Estimation of t-score and BMD values from X-ray images for detection of osteoporosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 220-224, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Rommel Evan J. Paje, Ariel M. Sison, Ruji P. Medina |
Multidimensional key RC6 algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 33-38, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Anan Nugroho, Risanuri Hidayat, Hanung Adi Nugroho |
Artifact removal in radiological ultrasound images using selective and adaptive median filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 237-241, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Salsabil Ahmed, Raisa Islam, Sadman Shawmik Himalay, Jia Uddin |
Preserving heritage sites using 3D modeling and virtual reality technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 267-272, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ch. Rupa 0001, C. Devi |
Privacy and protection of medical images ROI using SPLSB and bit-plane based watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 211-215, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Widya Wirachantika, Ari Moesriami Barmawi, Bambang Ari Wahyudi |
Strengthening fawkescoin against double spending attack using merkle tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 49-54, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yunyun Yang, Wenjing Jia, Dongcai Tian |
Improved active contour model for multi-phase MR image segmentation and bias field correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 242-246, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Mudassar Yamin, Basel Katt |
Mobile device management (MDM) technologies, issues and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 143-147, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Julia Ostheimer, Sarfraz Iqbal |
Privacy in online dating: does it matter? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 71-75, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Renato Rojas, Ana Muedas, David Mauricio |
Security maturity model of web applications for cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 130-137, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dyala R. Ibrahim, Rosni Abdullah, Je Sen Teh, Bisan Alsalibi |
Authentication for ID cards based on colour visual cryptography and facial recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 164-167, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jacob Leon Kröger, Philip Raschke, Towhidur Rahman Bhuiyan |
Privacy implications of accelerometer data: a review of possible inferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 81-87, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Aman Shakya, Nitesh Karna |
Enhancing MD5 hash algorithm using symmetric key encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 18-22, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Danlami Muktar, Sapiee Jamel, Sofia Najwa Ramli, Mustafa Mat Deris |
2D legendre wavelet filter for iris recognition feature extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 174-178, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | DaYong Wu, Kien Tsong Chau, Jingyi Wang, ChuTing Pan |
A comparative study on performance of XML parser APIs (DOM and SAX) in parsing efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 88-92, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mas Rina Mustaffa, Goh Sweet Wai, Lili Nurliyana Abdullah, Nurul Amelina Nasharuddin |
Dress me up!: content-based clothing image retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 206-210, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Parameshachari Bidare Divakarachari, Kiran, Rashmi P, Supriya M. C, Rajashekarappa, Panduranga H. T |
Controlled partial image encryption based on LSIC and chaotic map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 60-63, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kavindu Dodanduwa, Ishara Kaluthanthri |
Trust-based identity sharing for token grants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 168-173, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sihua Wu, Jiang Du |
Electronic medical record security sharing model based on blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019, pp. 13-17, 2019, ACM, 978-1-4503-6618-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shenwen Wang, Yonghui Yang, Tao Xia, Weiyan Zhang |
A Role and Node Based Access Control Model for Industrial Control Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 89-94, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Weiqing Cao, Xing Zhao, Fayou Yuan |
Research on Faults Propagation in Linux OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 165-169, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Leihang Chen, Jiang Du |
An Audit Model Based On FSM for Offline Synchronization System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 51-55, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Du, Xia Fan |
Adaptive Watermark Based on Screen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 1-4, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Biao Qi |
RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 77-81, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vasileios Mavroeidis, Audun Jøsang |
Data-Driven Threat Hunting Using Sysmon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 82-88, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Keishiro Fukushima, Toru Nakamura, Daisuke Ikeda, Shinsaku Kiyomoto |
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 62-66, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shan-Shan Jia, Ya-Bin Xu |
The APT Detection Method based on Attack Tree for SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 116-121, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yong Fang 0002, Xiao Long, Liang Liu 0009, Cheng Huang 0003 |
DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 10-15, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xinli Xiong, Guangsheng Zhao, Xian Wang |
A System Attack Surface Based MTD Effectiveness and Cost Quantification Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 175-179, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Tao Song, Bin Hu, Xiu-Feng Zhao |
Multi-bit Leveled Homomorphic Encryption of Message Matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 45-50, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yiran Shi |
A Method of Discriminating User's Identity Similarity Based on Username Feature Greedy Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 5-9, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jianhong Zhang, Peirong Ou, Wenle Bai |
On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 40-44, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yi Zhang, Yuexiang Yang, Xiaolei Wang 0003 |
A Novel Android Malware Detection Approach Based on Convolutional Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 144-149, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chengcheng Xu, Jinshu Su, Shuhui Chen |
Exploring Efficient NFA Data Structures to Accelerate DFA Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 56-61, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Uyangaa Khuchit, Yonghong Bai, Liji Wu, Xiangmin Zhang |
An Improved Cross-Coupled NAND Gates PUF for Bank IC Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 150-153, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lintao Dang, Qiang Li 0026, Jun Wu 0001, Jianhua Li 0001 |
A Hierarchical Access Control Encryption Scheme Based on Partially Ordered Set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 122-127, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Senhao Wen, Zhiyuan Zhao, Hanbing Yan |
Detecting Malicious Websites in Depth through Analyzing Topics and Web-pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018, pp. 128-133, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|