|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 355 occurrences of 253 keywords
|
|
|
Results
Found 1584 publication records. Showing 1584 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mingjiang Huang, Liming Wang, Yan Zhang |
Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 664-681, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan |
Cryptographic Password Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 497-512, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu |
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 584-597, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shakirah Hashim, Mohammed Benaissa |
Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 161-176, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Baum, Huang Lin, Sabine Oechsner |
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 303-322, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | George Teseleanu |
Random Number Generators Can Be Fooled to Behave Badly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 124-141, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens |
USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 732-742, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval |
FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 745-755, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kelly Yun, Xin Wang, Rui Xue 0001 |
Identity-Based Functional Encryption for Quadratic Functions from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 409-425, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ping Wang 0003, Zijian Zhang 0003, Ding Wang 0002 |
Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 805-816, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yun Guo, Daniel Sun 0004, Guoqiang Li 0001, Shiping Chen 0001 |
Examine Manipulated Datasets with Topology Data Analysis: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 358-373, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lin Wang, Min Zhu, Qing Li, Bibo Tu |
Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 721-731, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001 |
On Security in Encrypted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 192-211, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Min Zhu, Kun Zhang 0016, Bibo Tu |
PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 566-583, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng |
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 3-16, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jiahui Shen, Tianyu Chen, Lei Wang 0135, Yuan Ma |
An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 17-35, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jianing Liu, Kewei Lv |
Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 75-80, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rong Fan, Yaoyao Chang |
Machine Learning for Black-Box Fuzzing of Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 621-632, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mingyue Liang, Zhoujun Li 0001, Qiang Zeng 0001, Zhejun Fang |
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 313-324, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li |
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 51-62, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng 0005 |
A PUF and Software Collaborative Key Protection Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 291-303, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenjie Yang, Jian Weng 0001, Futai Zhang |
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 236-247, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang |
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 304-310, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Feng Xiao, Enhong Chen, Qiang Xu |
S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 412-423, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem |
Pollution Attacks Identification in Structured P2P Overlay Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 674-686, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daode Zhang, Bao Li 0001, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia |
Towards Tightly Secure Deterministic Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 154-161, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen 0007, Jingjing Liu, Tong Wu |
A Cross-Modal CCA-Based Astroturfing Detection Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 582-592, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu |
Practical Range Proof for Cryptocurrency Monero with Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 255-262, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Wang 0014, Meiqi Tian, Chunfu Jia |
An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 646-660, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhedong Wang, Xiong Fan, Mingsheng Wang |
Compact Inner Product Encryption from LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 141-153, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yuntao Wang 0002, Yoshinori Aono, Tsuyoshi Takagi |
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 541-553, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jing Yang 0032, Liming Wang, Zhen Xu 0009 |
A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 633-645, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Feiyang Peng, Zhihong Liu, Yong Zeng 0002, Jialei Wang |
Modeling Key Infection in Large-Scale Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 265-275, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bei Liang, Aikaterini Mitrokotsa |
Distributed Pseudorandom Functions for General Access Structures in NP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 81-87, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe |
Identity-Based Group Encryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 205-209, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xueqing Wang, Biao Wang, Rui Xue 0001 |
Two Efficient Tag-Based Encryption Schemes on Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 118-131, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xinyu Feng 0002, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu |
Practical Large Universe Attribute-Set Based Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 180-191, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li |
High-Performance Symmetric Cryptography Server with GPU Acceleration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 529-540, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ming Yuan, Ye Li, Zhoujun Li 0001 |
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 363-373, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenwen Wang, Kewei Lv |
The Reductions for the Approximating Covering Radius Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 65-74, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu |
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 661-673, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tianying Chen, Haiyan Kang |
Research on Clustering-Differential Privacy for Express Data Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 427-437, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng 0005 |
A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 105-117, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daode Zhang, Fuyang Fang, Bao Li 0001, Haiyang Xue, Bei Liang |
Compact Hierarchical IBE from Lattices in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 210-221, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Sharma 0006, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala |
Authenticated Group Key Agreement Protocol Without Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 606-618, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Juan Wang 0006, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang |
A Security-Enhanced vTPM 2.0 for Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 557-569, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Qingsong Zhao, Qingkai Zeng 0002, Ximeng Liu |
Efficient Inner Product Encryption with Simulation-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 162-171, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lei Xu 0019, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang 0029 |
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 516-528, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng |
Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 172-179, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li |
The De-anonymization Method Based on User Spatio-Temporal Mobility Trace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 459-471, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shuang Qiu 0004, Rui Zhang 0002, Yongbin Zhou, Hailong Zhang 0001 |
Reducing Randomness Complexity of Mask Refreshing Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 88-101, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama, Shogo Kimura |
Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 489-501, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie |
A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 248-254, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dali Zhu, Wenjing Rong, Di Wu 0004, Na Pang |
Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 352-362, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anirban Basu 0001, Rui Xu 0006, Juan Camilo Corena, Shinsaku Kiyomoto |
Hypercubes and Private Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 509-515, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jun Zhang 0049, Linru Zhang, Meiqi He, Siu-Ming Yiu |
Privacy-Preserving Disease Risk Test Based on Bloom Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 472-486, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ruo Mo, Jianfeng Ma 0001, Ximeng Liu, Qi Li 0011 |
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 39-50, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Meigen Huang, Bin Yu 0003 |
SDN-Based Secure Localization in Heterogeneous WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 276-287, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang |
Compact (Targeted Homomorphic) Inner Product Encryption from LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 132-140, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao 0005, Tong Chen 0007, Yinqi Yang, Yingxiao Xiang, Lei Han |
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 374-384, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer |
Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 225-235, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ying Xia, Yu Huang, Xu Zhang 0019, Hae-Young Bae |
Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 438-445, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xueping Liang, Sachin Shetty, Juan Zhao 0003, Daniel Bowden, Danyi Li, Jihong Liu |
Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 387-398, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhiqiang Xu, Debiao He, Xinyi Huang 0001 |
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 595-605, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia |
A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 325-335, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval |
SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 570-581, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yu Li, Yazhe Wang, Yuan Zhang 0004 |
SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 339-351, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xinyu Feng 0002, Cong Li, Dan Li, Yuejian Fang, Qingni Shen |
Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 192-204, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hai Liu 0007, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian 0004, Laifeng Lu |
Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 446-458, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lingchen Li, Wenling Wu, Lei Zhang 0012 |
Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 502-508, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Changji Wang, Yuan Yuan, Shengyi Jiang |
P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 399-411, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu |
SECapacity: A Secure Capacity Scheduler in YARN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 184-194, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Changhai Ou, Zhu Wang 0005, Degang Sun, Xinping Zhou, Juan Ai |
Group Verification Based Multiple-Differential Collision Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 145-156, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu |
A Practical Scheme for Data Secure Transport in VoIP Conferencing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 466-475, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl |
Weaknesses in Security Considerations Related to Chaos-Based Image Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 278-291, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun |
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 54-70, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kwok-Yan Lam, Chi-Hung Chi |
Identity in the Internet-of-Things (IoT): New Challenges and Opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 18-26, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Monarev, Ilja Duplischev, Andrey Pestunov |
Compression-Based Integral Prior Classification for Improving Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 134-144, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nan Yao, Yu Yu 0001, Xiangxue Li, Dawu Gu |
On the Robustness of Learning Parity with Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 99-106, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sumit Kumar Debnath, Ratna Dutta |
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 445-454, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Robert Buhren, Julian Vetter, Jan Nordholz |
The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 376-391, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen |
DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 347-357, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thanh Nghia Ho, Wee Keong Ng |
Application of Stylometry to DarkWeb Forum User Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 173-183, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lei Lei, Quanwei Cai 0001, Bo Chen, Jingqiang Lin |
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 71-84, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wenwen Wang, Kewei Lv, Jianing Liu |
The Variant of Remote Set Problem on Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 124-133, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin |
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 197-213, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl |
Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 241-253, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin |
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 292-306, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | M. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini |
Towards Trustworthy Smart Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 392-399, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | B. S. Vidyalakshmi, Raymond K. Wong 0001 |
Is it Good or Bad? Disclosure of Medical Ailments on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 262-277, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu |
MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 214-226, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Raymond K. Wong 0001, B. S. Vidyalakshmi |
Privacy Leakage via Attribute Inference in Directed Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 333-346, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peeter Laud, Alisa Pankova |
Optimizing Secure Computation Programs with Private Conditionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 418-430, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Da-Zhi Sun, Xiao-Hong Li 0001 |
Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 403-417, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yaowen Zheng, Kai Cheng, Zhi Li 0018, Shiran Pan, Hongsong Zhu, Limin Sun |
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 27-36, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu 0009, Meng Li 0015 |
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 39-53, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peizhi Shao, Jiuming Lu, Raymond K. Wong 0001, Wenzhuo Yang |
A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 159-172, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.) |
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![Springer, 978-3-319-29813-9 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bo Song, Yiming Zhao |
Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 227-238, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Paul Tak Shing Liu |
Medical Record System Using Blockchain, Big Data and Tokenization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 254-261, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 1584 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|