|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 391 occurrences of 265 keywords
|
|
|
Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim |
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 461-475, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kento Oonishi, Noboru Kunihiro |
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 642-652, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Damodaran, Alfredo Rial |
Unlinkable Updatable Databases and Oblivious Transfer with Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 584-604, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abderrahmane Nitaj, Willy Susilo, Joseph Tonien |
A New Improved AES S-box with Enhanced Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 125-141, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay |
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 525-542, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard |
Lattice Blind Signatures with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 3-22, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Guo, Yan Liu, Lian Liu, Guangsheng Zhang, Jing Chen, Yuan Zhao |
User Identity Linkage Across Social Networks via Community Preserving Network Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 621-630, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, R. Kabaleeshwaran |
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 183-203, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolei Liu 0001, Teng Hu, Kangyi Ding, Yang Bai, Weina Niu, Jiazhong Lu |
A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 268-284, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang 0001 |
Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 82-101, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun 0001, Chao Li 0002 |
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 105-124, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Kurek |
Efficient Forward-Secure Threshold Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 330-349, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Hui Cui 0001 (eds.) |
Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![Springer, 978-3-030-55303-6 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zuchao Ma, Liang Liu 0006, Weizhi Meng 0001 |
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 247-267, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian |
PALOR: Poisoning Attacks Against Logistic Regression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 447-460, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Tezuka, Keisuke Tanaka |
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 225-243, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Chao Sun, Mehdi Tibouchi, Masayuki Abe |
Revisiting the Hardness of Binary Error LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 425-444, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Linyu Li, Lei Yu, Can Yang, Jie Gou, Jiawei Yin, Xiaorui Gong |
Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 479-504, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yaoan Jin, Atsuko Miyaji |
Secure and Compact Elliptic Curve LR Scalar Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 605-618, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mengfei Xie, Jianming Fu, Jia He, Chenke Luo, Guojun Peng |
JTaint: Finding Privacy-Leakage in Chrome Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 563-583, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Boru Gong, Leixiao Cheng, Yunlei Zhao |
SKCN: Practical and Flexible Digital Signature from Module Lattice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 62-81, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yusong Du, Baoying Fan, Baodian Wei |
Arbitrary-Centered Discrete Gaussian Sampling over the Integers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 391-407, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zhe Xia, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang, Yi Mu 0001 |
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 631-641, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Xiangyu Liu, Shengli Liu 0001, Dawu Gu |
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 664-673, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen |
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 160-179, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Bo Pang, Long Chen 0018, Xiong Fan, Qiang Tang 0005 |
Multi-input Laconic Function Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 369-388, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao 0001, Licheng Wang, Zhusen Liu |
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 408-424, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lin Zhong 0003, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu |
A Flexible Instant Payment System Based on Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 289-306, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Woojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim |
Automated Cash Mining Attacks on Mobile Advertising Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 679-686, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu |
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 307-321, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Arnaud Sipasseuth, Thomas Plantard, Willy Susilo |
Improving the Security of the DRS Scheme with Uniformly Chosen Random Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 119-137, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yunwen Liu, Yu Sasaki |
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 555-572, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tapas Pal, Ratna Dutta |
Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 78-96, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu 0001, Joseph K. Liu |
Fast-to-Finalize Nakamoto-Like Consensus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 271-288, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Ting Huang, Yu-Yuan Chen, Chih-Chun Yang 0004, Yeali S. Sun, Shun-Wen Hsiao, Meng Chang Chen |
Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 660-668, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Liang Zheng 0005, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang |
A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 475-493, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Julian Jang-Jaccard, Fuchun Guo (eds.) |
Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![Springer, 978-3-030-21547-7 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dongxue Pan, Bei Liang, Hongda Li 0001, Peifang Ni |
Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 609-619, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xuejun Fan, Song Tian, Bao Li 0001, Weixuan Li |
Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 630-638, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sean Murphy, Rachel Player |
\delta -subgaussian Random Variables in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 251-268, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Timothy Curry, Devon Callahan, Benjamin Fuller 0001, Laurent Michel |
DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 456-474, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yunhao Ling, Sha Ma, Qiong Huang 0001, Ru Xiang, Ximing Li 0001 |
Group ID-Based Encryption with Equality Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 39-57, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Terry Shue Chien Lau, Chik How Tan |
Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 211-228, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tim van de Kamp, David Stritzl, Willem Jonker, Andreas Peter |
Two-Client and Multi-client Functional Encryption for Set Intersection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 97-115, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 |
Function-Dependent Commitments from Homomorphic Authenticators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 399-418, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Joseph Tonien, Guomin Yang |
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 381-398, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo, Qingkai Zeng 0002 |
AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 514-532, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Wei Zong, Yang-Wai Chow, Willy Susilo |
Dimensionality Reduction and Visualization of Network Intrusion Detection Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 441-455, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nan Cui, Shengli Liu 0001, Yunhua Wen, Dawu Gu |
Pseudorandom Functions from LWE: RKA Security and Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 229-250, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yaoan Jin, Atsuko Miyaji |
Secure and Compact Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 639-650, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001 |
A Highly Secure MAC from Tweakable Blockciphers with Support for Short Tweaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 588-606, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Geng Li, Jianwei Liu 0001, Zongyang Zhang |
Security Against Subversion in a Multi-surveillant Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 419-437, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ziyu Wang 0009, Jianwei Liu 0001, Zongyang Zhang, Yanting Zhang 0002, Jiayuan Yin, Hui Yu, Wenmao Liu |
A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 322-339, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Li-Ping Wang, Jingwei Hu |
Two New Module-Code-Based KEMs with Rank Metric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 176-191, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Atsunori Ichikawa, Wakaha Ogata, Koki Hamada, Ryo Kikuchi |
Efficient Secure Multi-Party Protocols for Decision Tree Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 362-380, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dunming Li, Jenwen Mao, Fuke Shen |
A Novel Semi-supervised Adaboost Technique Based on Improved Tri-training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 669-678, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal, Dongxi Liu |
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 3-20, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xiaojian Pang, Li Yang 0005, Maozhen Liu 0001, Jianfeng Ma 0001 |
MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 533-551, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mohammadreza Ashouri |
Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 494-513, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Alex Davidson, Amit Deo, Ela Lee, Keith Martin |
Strong Post-Compromise Secure Proxy Re-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 58-77, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui |
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 192-210, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy 0001, Willy Susilo |
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 138-155, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan 0005, Dongxi Liu |
Location Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 21-38, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Weixuan Li, Wei Yu 0008, Bao Li 0001, Xuejun Fan |
Speeding up Scalar Multiplication on Koblitz Curves Using \mu _4 Coordinates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 620-629, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Debanjan Sadhya, Bodhi Chakraborty |
A Quantitative Study of Attribute Based Correlation in Micro-databases and Its Effects on Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 651-659, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda 0002, Yusuke Sakai 0001, Jacob C. N. Schuldt |
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 343-361, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng |
Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 156-175, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Chunbo Zhu, Gaoli Wang, Boyu Zhu |
Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings, pp. 573-587, 2019, Springer, 978-3-030-21547-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi |
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 487-501, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yinxia Sun, Futai Zhang, Anmin Fu |
Revocable Certificateless Encryption with Ciphertext Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 741-749, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yeali S. Sun, Chien-Chun Chen, Shun-Wen Hsiao, Meng Chang Chen |
ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 796-804, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Qiqi Lai, Bo Yang 0003, Yong Yu 0002, Yuan Chen 0008, Liju Dong |
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 539-557, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda 0002, Koki Hamada, Koji Chida |
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 64-82, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zhe Xia, Liuying Sun, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang |
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 83-100, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mohamad Barbar, Yulei Sui, Hongyu Zhang 0002, Shiping Chen 0001, Jingling Xue |
Live Path CFI Against Control Flow Hijacking Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 768-779, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan |
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 455-466, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jie Cui 0004, Jiantao He, Yan Xu 0007, Hong Zhong 0001 |
TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 649-665, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Souradyuti Paul, Ananya Shrivastava |
Robust Multiparty Computation with Faster Verification Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 114-131, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu |
Decentralized Blacklistable Anonymous Credentials with Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 720-738, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Howard M. Heys |
Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 135-153, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Liqiang Peng, Yao Lu 0002, Noboru Kunihiro, Rui Zhang 0002, Lei Hu |
A Deterministic Algorithm for Computing Divisors in an Interval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 3-12, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yuntao Wang 0002, Tsuyoshi Takagi |
Improving the BKZ Reduction Algorithm by Quick Reordering Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 787-795, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chen-Dong Ye, Tian Tian 0004 |
A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 172-187, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yuncong Zhang, Yu Long 0001, Zhen Liu 0008, Zhiqiang Liu 0001, Dawu Gu |
Z-Channel: Scalable and Efficient Scheme in Zerocash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 687-705, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe 0001 |
Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 341-359, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lin Liu 0018, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang 0002, Shuhui Chen, Ho-fung Leung |
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 431-451, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao |
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 805-812, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong 0003, Shuangyu He, Jianwei Liu 0001 |
Linkable Group Signature for Auditing Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 304-321, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Eunkyung Kim 0002, Hyang-Sook Lee, Jeongeun Park 0001 |
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 101-113, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Handan Kilinç, Serge Vaudenay |
Secure Contactless Payment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 579-597, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lin Zhong 0003, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu 0001 |
Auditable Hierarchy-Private Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 322-340, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ziyuan Hu, Shengli Liu 0001, Kefei Chen, Joseph K. Liu |
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 265-283, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jian Shen 0001, Dengzhi Liu, Xiaofeng Chen 0001, Xinyi Huang 0001, Jiageng Chen, Mingwu Zhang |
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 417-430, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yunhua Wen, Shengli Liu 0001 |
Reusable Fuzzy Extractor from LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 13-27, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sumanta Sarkar, Habeeb Syed |
Bounds on Differential and Linear Branch Number of Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 207-224, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand |
New Attacks and Secure Design for Anonymous Distance-Bounding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 598-616, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu |
Lattice-Based Universal Accumulator with Nonmembership Arguments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 502-519, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Weizhi Meng 0001, Yu Wang 0017, Wenjuan Li 0001, Zhe Liu 0001, Jin Li 0002, Christian W. Probst |
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 759-767, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kexin Hu, Zhenfeng Zhang |
Fast Lottery-Based Micropayments for Decentralized Currencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 669-686, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Guomin Yang (eds.) |
Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![Springer, 978-3-319-93637-6 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 930 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|