The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICICS"( http://dblp.L3S.de/Venues/ICICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEicics

Publication years (Num. hits)
1997 (49) 1999 (27) 2001 (57) 2002 (42) 2003 (38) 2004 (43) 2005 (41) 2006 (40) 2007 (38) 2008 (30) 2009 (40) 2010 (33) 2011 (267) 2012 (50) 2013 (234) 2014 (22) 2015 (224) 2016 (38) 2017 (57) 2018 (52)
Publication types (Num. hits)
inproceedings(1399) proceedings(23)
Venues (Conferences, Journals, ...)
ICICS(1422)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 355 occurrences of 253 keywords

Results
Found 1422 publication records. Showing 1422 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jian Xu 0010, Xiaochun Yun, Yongzheng Zhang 0002, Zhenyu Cheng Community Discovery of Attribution Trace Based on Deep Learning Approach. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Seiko Arita Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Min Zhu, Kun Zhang, Bibo Tu PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin Hierarchical Group Signatures with Verifier-Local Revocation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan CCA Secure Multi-recipient KEM from LPN. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001 On Security in Encrypted Computing. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thanh Bui, Tuomas Aura Application of Public Ledgers to Revocation in Distributed Access Control. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Meng Zheng, Jun Zhou, Zhenfu Cao, Xiaolei Dong PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen 0001 Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter uMine: A Blockchain Based on Human Miners. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Tapash Saha Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carsten Baum, Huang Lin, Sabine Oechsner Towards Practical Lattice-Based One-Time Linkable Ring Signatures. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mingjiang Huang, Liming Wang, Yan Zhang Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kelly Yun, Xin Wang, Rui Xue Identity-Based Functional Encryption for Quadratic Functions from Lattices. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens Linking Differential Identifiability with Differential Privacy. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhiyuan Zhao, Chenxu Wang, Wei Rao Slop: Towards an Efficient and Universal Streaming Log Parser. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yingpei Zeng, Shanqing Guo Deep Packet Inspection with Delayed Signature Matching in Network Auditing. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shakirah Hashim, Mohammed Benaissa Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Florian Kammüller Attack Trees in Isabelle. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ping Wang, Zijian Zhang, Ding Wang 0002 Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lin Wang, Min Zhu, Qing Li, Bibo Tu Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rui Zhang 0002, Yang Tao Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xi Luo, Liming Wang, Zhen Xu, Wei An LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi (eds.) Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan Cryptographic Password Obfuscation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fan Zhang, Cong Zhang, Mingdi Xu, Xiaoli Liu, Fangning Hu, Han-Chieh Chao Automated Verification of Noninterference Property. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cédric Van Rompay, Refik Molva, Melek Önen Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maharage Nisansala Sevwandi Perera, Takeshi Koshiba Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ya Han, Yongqiang Li, Mingsheng Wang Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yun Guo, Daniel Sun, Guoqiang Li 0001, Shiping Chen Examine Manipulated Datasets with Topology Data Analysis: A Case Study. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mamoru Mimura, Hidema Tanaka A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chenyu Wang, Tao Huang, Hongjun Wu On the Weakness of Constant Blinding PRNG in Flash Player. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yao Lu 0002, Noboru Kunihiro, Rui Zhang 0002, Liqiang Peng, Hui Ma 0002 Certifying Variant of RSA with Generalized Moduli. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui Study on Advanced Botnet Based on Publicly Available Resources. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhili Chen, Sheng Chen, Hong Zhong 0001, Lin Chen 0002, Miaomiao Tian PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu (eds.) Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henning Kopp, Frank Kargl, Christoph Bösch Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peifang Ni, Hongda Li, Dongxue Pan Micropaying to a Distributed Payee with Instant Confirmation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1George Teseleanu Random Number Generators Can Be Fooled to Behave Badly. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xingfeng Wang, Liang Zhao Verifiable Single-Server Private Information Retrieval. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kai Chen, Ning Zhang, Liming Wang, Zhen Xu Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuan Zhang 0006, Xiaodong Lin, Chunxiang Xu Blockchain-Based Secure Data Provenance for Cloud Storage. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chengwei Peng, Xiaochun Yun, Yongzheng Zhang 0002, Shuhao Li MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qingsong Zhao, Qingkai Zeng, Ximeng Liu Efficient Inner Product Encryption with Simulation-Based Security. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama, Shogo Kimura Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhi Wang 0014, Meiqi Tian, Chunfu Jia An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenwen Wang, Kewei Lv The Reductions for the Approximating Covering Radius Problem. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li High-Performance Symmetric Cryptography Server with GPU Acceleration. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian, Laifeng Lu Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yu Li, Yazhe Wang, Yuan Zhang SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bei Liang, Aikaterini Mitrokotsa Distributed Pseudorandom Functions for General Access Structures in NP. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Changji Wang, Yuan Yuan, Shengyi Jiang P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ming Yuan, Ye Li, Zhoujun Li Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang A Security-Enhanced vTPM 2.0 for Cloud Computing. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu A Cross-Modal CCA-Based Astroturfing Detection Approach. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meigen Huang, Bin Yu 0003 SDN-Based Secure Localization in Heterogeneous WSN. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lei Xu 0019, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang 0029 A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia Towards Tightly Secure Deterministic Public Key Encryption. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li 0011 FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xueqing Wang, Biao Wang, Rui Xue 0001 Two Efficient Tag-Based Encryption Schemes on Lattices. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ying Xia, Yu Huang, Xu Zhang 0019, HaeYoung Bae Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jing Yang, Liming Wang, Zhen Xu A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shuang Qiu 0004, Rui Zhang 0002, Yongbin Zhou, Hailong Zhang 0001 Reducing Randomness Complexity of Mask Refreshing Algorithm. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li The De-anonymization Method Based on User Spatio-Temporal Mobility Trace. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lingchen Li, Wenling Wu, Lei Zhang Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem Pollution Attacks Identification in Structured P2P Overlay Networks. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dali Zhu, Wenjing Rong, Di Wu, Na Pang Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng A PUF and Software Collaborative Key Protection Scheme. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tianying Chen, Haiyan Kang Research on Clustering-Differential Privacy for Express Data Release. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang Compact Hierarchical IBE from Lattices in the Standard Model. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu Practical Large Universe Attribute-Set Based Encryption in the Standard Model. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang Compact (Targeted Homomorphic) Inner Product Encryption from LWE. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jianing Liu, Kewei Lv Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Feiyang Peng, Zhihong Liu, Yong Zeng, Jialei Wang Modeling Key Infection in Large-Scale Sensor Networks. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gaurav Sharma 0006, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala Authenticated Group Key Agreement Protocol Without Pairing. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mingyue Liang, Zhoujun Li, Qiang Zeng 0001, Zhejun Fang Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenjie Yang, Jian Weng, Futai Zhang New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rong Fan, Yaoyao Chang Machine Learning for Black-Box Fuzzing of Network Protocols. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe Identity-Based Group Encryption Revisited. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1422 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license