|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 355 occurrences of 253 keywords
|
|
|
Results
Found 1584 publication records. Showing 1584 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mingjiang Huang, Liming Wang, Yan Zhang |
Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan |
Cryptographic Password Obfuscation. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu |
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shakirah Hashim, Mohammed Benaissa |
Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Baum, Huang Lin, Sabine Oechsner |
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | George Teseleanu |
Random Number Generators Can Be Fooled to Behave Badly. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens |
USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval |
FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kelly Yun, Xin Wang, Rui Xue 0001 |
Identity-Based Functional Encryption for Quadratic Functions from Lattices. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ping Wang 0003, Zijian Zhang 0003, Ding Wang 0002 |
Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yun Guo, Daniel Sun 0004, Guoqiang Li 0001, Shiping Chen 0001 |
Examine Manipulated Datasets with Topology Data Analysis: A Case Study. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lin Wang, Min Zhu, Qing Li, Bibo Tu |
Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001 |
On Security in Encrypted Computing. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Min Zhu, Kun Zhang 0016, Bibo Tu |
PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. |
ICICS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng |
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jiahui Shen, Tianyu Chen, Lei Wang 0135, Yuan Ma |
An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jianing Liu, Kewei Lv |
Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rong Fan, Yaoyao Chang |
Machine Learning for Black-Box Fuzzing of Network Protocols. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mingyue Liang, Zhoujun Li 0001, Qiang Zeng 0001, Zhejun Fang |
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li |
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng 0005 |
A PUF and Software Collaborative Key Protection Scheme. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenjie Yang, Jian Weng 0001, Futai Zhang |
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang |
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Feng Xiao, Enhong Chen, Qiang Xu |
S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem |
Pollution Attacks Identification in Structured P2P Overlay Networks. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daode Zhang, Bao Li 0001, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia |
Towards Tightly Secure Deterministic Public Key Encryption. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen 0007, Jingjing Liu, Tong Wu |
A Cross-Modal CCA-Based Astroturfing Detection Approach. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu |
Practical Range Proof for Cryptocurrency Monero with Provable Security. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Wang 0014, Meiqi Tian, Chunfu Jia |
An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhedong Wang, Xiong Fan, Mingsheng Wang |
Compact Inner Product Encryption from LWE. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yuntao Wang 0002, Yoshinori Aono, Tsuyoshi Takagi |
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jing Yang 0032, Liming Wang, Zhen Xu 0009 |
A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Feiyang Peng, Zhihong Liu, Yong Zeng 0002, Jialei Wang |
Modeling Key Infection in Large-Scale Sensor Networks. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bei Liang, Aikaterini Mitrokotsa |
Distributed Pseudorandom Functions for General Access Structures in NP. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe |
Identity-Based Group Encryption Revisited. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xueqing Wang, Biao Wang, Rui Xue 0001 |
Two Efficient Tag-Based Encryption Schemes on Lattices. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xinyu Feng 0002, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu |
Practical Large Universe Attribute-Set Based Encryption in the Standard Model. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li |
High-Performance Symmetric Cryptography Server with GPU Acceleration. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ming Yuan, Ye Li, Zhoujun Li 0001 |
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenwen Wang, Kewei Lv |
The Reductions for the Approximating Covering Radius Problem. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu |
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tianying Chen, Haiyan Kang |
Research on Clustering-Differential Privacy for Express Data Release. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng 0005 |
A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daode Zhang, Fuyang Fang, Bao Li 0001, Haiyang Xue, Bei Liang |
Compact Hierarchical IBE from Lattices in the Standard Model. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Sharma 0006, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala |
Authenticated Group Key Agreement Protocol Without Pairing. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Juan Wang 0006, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang |
A Security-Enhanced vTPM 2.0 for Cloud Computing. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Qingsong Zhao, Qingkai Zeng 0002, Ximeng Liu |
Efficient Inner Product Encryption with Simulation-Based Security. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lei Xu 0019, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang 0029 |
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng |
Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li |
The De-anonymization Method Based on User Spatio-Temporal Mobility Trace. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shuang Qiu 0004, Rui Zhang 0002, Yongbin Zhou, Hailong Zhang 0001 |
Reducing Randomness Complexity of Mask Refreshing Algorithm. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama, Shogo Kimura |
Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie |
A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dali Zhu, Wenjing Rong, Di Wu 0004, Na Pang |
Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anirban Basu 0001, Rui Xu 0006, Juan Camilo Corena, Shinsaku Kiyomoto |
Hypercubes and Private Information Retrieval. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jun Zhang 0049, Linru Zhang, Meiqi He, Siu-Ming Yiu |
Privacy-Preserving Disease Risk Test Based on Bloom Filters. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ruo Mo, Jianfeng Ma 0001, Ximeng Liu, Qi Li 0011 |
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Meigen Huang, Bin Yu 0003 |
SDN-Based Secure Localization in Heterogeneous WSN. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang |
Compact (Targeted Homomorphic) Inner Product Encryption from LWE. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao 0005, Tong Chen 0007, Yinqi Yang, Yingxiao Xiang, Lei Han |
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer |
Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ying Xia, Yu Huang, Xu Zhang 0019, Hae-Young Bae |
Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xueping Liang, Sachin Shetty, Juan Zhao 0003, Daniel Bowden, Danyi Li, Jihong Liu |
Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhiqiang Xu, Debiao He, Xinyi Huang 0001 |
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia |
A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval |
SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yu Li, Yazhe Wang, Yuan Zhang 0004 |
SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xinyu Feng 0002, Cong Li, Dan Li, Yuejian Fang, Qingni Shen |
Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hai Liu 0007, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian 0004, Laifeng Lu |
Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lingchen Li, Wenling Wu, Lei Zhang 0012 |
Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Changji Wang, Yuan Yuan, Shengyi Jiang |
P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu |
SECapacity: A Secure Capacity Scheduler in YARN. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Changhai Ou, Zhu Wang 0005, Degang Sun, Xinping Zhou, Juan Ai |
Group Verification Based Multiple-Differential Collision Attack. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu |
A Practical Scheme for Data Secure Transport in VoIP Conferencing. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl |
Weaknesses in Security Considerations Related to Chaos-Based Image Encryption. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun |
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kwok-Yan Lam, Chi-Hung Chi |
Identity in the Internet-of-Things (IoT): New Challenges and Opportunities. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Monarev, Ilja Duplischev, Andrey Pestunov |
Compression-Based Integral Prior Classification for Improving Steganalysis. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nan Yao, Yu Yu 0001, Xiangxue Li, Dawu Gu |
On the Robustness of Learning Parity with Noise. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sumit Kumar Debnath, Ratna Dutta |
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Robert Buhren, Julian Vetter, Jan Nordholz |
The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen |
DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thanh Nghia Ho, Wee Keong Ng |
Application of Stylometry to DarkWeb Forum User Identification. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lei Lei, Quanwei Cai 0001, Bo Chen, Jingqiang Lin |
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wenwen Wang, Kewei Lv, Jianing Liu |
The Variant of Remote Set Problem on Lattices. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin |
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl |
Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin |
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | M. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini |
Towards Trustworthy Smart Cyber-Physical Systems. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | B. S. Vidyalakshmi, Raymond K. Wong 0001 |
Is it Good or Bad? Disclosure of Medical Ailments on Twitter. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu |
MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Raymond K. Wong 0001, B. S. Vidyalakshmi |
Privacy Leakage via Attribute Inference in Directed Social Networks. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peeter Laud, Alisa Pankova |
Optimizing Secure Computation Programs with Private Conditionals. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Da-Zhi Sun, Xiao-Hong Li 0001 |
Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yaowen Zheng, Kai Cheng, Zhi Li 0018, Shiran Pan, Hongsong Zhu, Limin Sun |
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu 0009, Meng Li 0015 |
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peizhi Shao, Jiuming Lu, Raymond K. Wong 0001, Wenzhuo Yang |
A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.) |
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bo Song, Yiming Zhao |
Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Paul Tak Shing Liu |
Medical Record System Using Blockchain, Big Data and Tokenization. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 1584 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|