Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Chien-Ming Chen 0001, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun |
A Methodology for Hook-Based Kernel Level Rootkits. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang 0002 |
HDROP: Detecting ROP Attacks Using Performance Monitoring Counters. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vandana Guleria, Ratna Dutta |
Efficient Adaptive Oblivious Transfer in UC Framework. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xinyi Huang, Jianying Zhou 0001 (eds.) |
Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kishan Chand Gupta, Indranil Ghosh Ray |
On Constructions of Circulant MDS Matrices for Lightweight Cryptography. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kefeng Wang, Yi Mu 0001, Willy Susilo, Fuchun Guo |
Attribute-Based Signature with Message Recovery. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yonggan Hou, Jianwei Zhuge, Dan Xin, Wenya Feng |
SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jie Zhang 0030, Futai Zhang |
Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0009, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu 0001, Wenchang Shi |
Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu 0002 |
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Javier López 0001, Ruben Rios, Jorge Cuéllar |
Preserving Receiver-Location Privacy in Wireless Sensor Networks. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Danhui Wang, An Wang, Xuexin Zheng |
Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuai Han 0001, Shengli Liu 0001, Kefei Chen, Dawu Gu |
Proofs of Retrievability Based on MRD Codes. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache |
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer |
A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuede Ji, Yukun He, Dewei Zhu, Qiang Li 0008, Dong Guo 0002 |
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo |
A CAPTCHA Scheme Based on the Identification of Character Locations. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hong Xu 0008, Lin Tan 0010, Xuejia Lai |
On the Recursive Construction of MDS Matrices for Lightweight Cryptography. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak 0001, Lukasz Krzywiecki |
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld |
Security Evaluation of Rakaposhi Stream Cipher. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guomin Yang, Yi Mu 0001, Willy Susilo, Duncan S. Wong |
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dheerendra Mishra, Sourav Mukhopadhyay |
Secure Content Delivery in DRM System with Consumer Privacy. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan |
Trusted Identity Management for Overlay Networks. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hao Xiong 0002, Tsz Hon Yuen, Cong Zhang 0001, Yi Jun He, Siu-Ming Yiu |
Attribute Specified Identity-Based Encryption. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Junzuo Lai, Xuhua Ding, Yongdong Wu |
Accountable Trapdoor Sanitizable Signatures. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yu 0008, Kunpeng Wang, Bao Li 0001, Song Tian |
Joint Triple-Base Number System for Multi-Scalar Multiplication. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ling Song 0001, Lei Hu |
Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg |
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen 0012, Yingjun Zhang |
Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kefeng Wang, Yi Mu 0001, Willy Susilo |
Identity-Based Multisignature with Message Recovery. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mixia Liu, Tao Feng, Paul Smith 0001, David Hutchison 0001 |
Situational Awareness for Improving Network Resilience Management. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dingding Jia, Bao Li 0001, Yamin Liu, Qixiang Mei |
Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yingjun Zhang, Kai Chen 0012, Yifeng Lian |
VulLocator: Automatically Locating Vulnerable Code in Binary Programs. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nan Li 0007, Yi Mu 0001, Willy Susilo, Vijay Varadharajan |
Secure RFID Ownership Transfer Protocols. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert H. Deng, Tao Feng (eds.) |
Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jungin Kang, Sangwook Lee, Heejo Lee |
A Digital Forensic Framework for Automated User Activity Reconstruction. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofan Liu, Natasha Alechina, Brian Logan 0001 |
Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang 0009, Wenling Wu, Liting Zhang |
Cryptanalysis of the OKH Authenticated Encryption Scheme. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski |
Simplified PACE|AA Protocol. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jairo Serrano, Eduardo César, Elisa Heymann, Barton P. Miller |
Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Meng 0001, Lam-for Kwok |
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kaitai Liang, Qiong Huang 0001, Roman Schlegel, Duncan S. Wong, Chunming Tang 0003 |
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu 0001 |
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yu 0008, Kunpeng Wang, Bao Li 0001, Song Tian |
About Hash into Montgomery Form Elliptic Curves. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Balachandran, Sabu Emmanuel |
Software Protection with Obfuscation and Encryption. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang 0001 |
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shichao Jin, Okhee Kim, Tieming Chen |
Efficient Attack Detection Based on a Compressed Model. |
ISPEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nathaniel Wesley Filardo, Giuseppe Ateniese |
High-Entropy Visual Identification for Touch Screen Devices. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xianhui Lu, Bao Li 0001, Qixiang Mei, Yamin Liu |
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yang-Wai Chow, Willy Susilo |
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yue Sun, Meiqin Wang |
Linear Cryptanalysis of Reduced-Round ICEBERG. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry |
Fault Analysis of the KATAN Family of Block Ciphers. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Takuma Koyama, Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta |
New Truncated Differential Cryptanalysis on 3D Block Cipher. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dongxia Bai, Leibo Li |
New Impossible Differential Attacks on Camellia. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto 0001, Hideki Sakurada |
Computational Soundness of Indistinguishability Properties without Computable Parsing. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan |
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson |
A Framework for Security Analysis of Key Derivation Functions. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ya Liu 0001, Dawu Gu, Zhiqiang Liu 0001, Wei Li 0013 |
Impossible Differential Attacks on Reduced-Round LBlock. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhenfei Zhang, Thomas Plantard, Willy Susilo |
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fuchun Guo, Yi Mu 0001, Willy Susilo, Vijay Varadharajan |
A Pre-computable Signature Scheme with Efficient Verification for RFID. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Liedel |
Secure Distributed Computation of the Square Root and Applications. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | An Wang 0001, Man Chen, Zongyue Wang, Yaoling Ding |
Overcoming Significant Noise: Correlation-Template-Induction Attack. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wang 0135, Ji Xiang, Jiwu Jing, Lingchen Zhang |
Towards Fine-Grained Access Control on Browser Extensions. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christian L. F. Corniaux, Hossein Ghodosi |
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote |
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Teng Guo, Feng Liu 0001, Chuan Kun Wu |
On the Equivalence of Two Definitions of Visual Cryptography Scheme. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chong-zhi Gao, Dongqing Xie, Baodian Wei |
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Braun 0001, Moritz Horsch, Alexander Wiesmaier |
iPIN and mTAN for Secure eID Applications. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shuo Tian, Yeping He, Baozeng Ding |
Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi 0001, Tsuyoshi Takagi |
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yanfeng Wang, Wenling Wu, Xiaoli Yu |
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mark Dermot Ryan, Ben Smyth, Guilin Wang (eds.) |
Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marc Joye, Tancrède Lepoint |
Partial Key Exposure on RSA with Private Exponents Larger Than N. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Michéle, Juliane Krämer, Jean-Pierre Seifert |
Structure-Based RSA Fault Attacks. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer |
Redactable Signatures for Independent Removal of Structure and Content. |
ISPEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guangdong Yang, Shaohua Tang, Li Yang |
A Novel Group Signature Scheme Based on MPKC. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fangming Zhao, Takashi Nishide, Kouichi Sakurai |
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonghoon Kwon, Jehyun Lee, Heejo Lee |
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, Jian Weng 0001 (eds.) |
Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jun-e Liu, Zhiguo Wan, Ming Gu 0001 |
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bo Liang, Wenling Wu, Liting Zhang |
BCBC: A More Efficient MAC Algorithm. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu |
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Song Luo, Yu Chen 0003, Jian-bin Hu, Zhong Chen 0001 |
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu 0005 |
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Liqun Chen 0002, Zhong Chen 0001 |
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu |
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lijun Zhang 0013, Kunpeng Wang, Hong Wang, Dingfeng Ye |
Another Elliptic Curve Model for Faster Pairing Computation. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Nakahara Jr. |
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova |
Privacy Enhanced Access Control by Means of Policy Blinding. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yamin Liu, Bao Li 0001, Xianhui Lu, Xiaoying Jia 0002 |
Encryption Simulatability Reconsidered. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xuhua Zhou, Xuhua Ding, Kefei Chen |
Lightweight Delegated Subset Test with Privacy Protection. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xingwen Zhao, Fangguo Zhang |
Traitor Tracing against Public Collaboration. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin |
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yongzhuang Wei, Jiqiang Lu, Yupu Hu |
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tristan Allard, Benjamin Nguyen, Philippe Pucheral |
Sanitizing Microdata without Leak: Combining Preventive and Curative Actions. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mahabir Prasad Jhanwar |
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yikai Wang, Yi Mu 0001, Minjie Zhang |
Policy-Based Authentication for Mobile Agents. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Quan Pham, Jason Reid, Ed Dawson |
A Model for Constraint and Delegation Management. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Imad M. Abbadi |
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiaxin Pan, Libin Wang, Changshe Ma |
Analysis and Improvement of an Authenticated Key Exchange Protocol. |
ISPEC |
2011 |
DBLP DOI BibTeX RDF |
|