default search action
10th ISPEC 2014: Fuzhou, China
- Xinyi Huang, Jianying Zhou:
Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Lecture Notes in Computer Science 8434, Springer 2014, ISBN 978-3-319-06319-5
Invited Papers from Keynote Speakers
- Dieter Gollmann:
Access Control in and Around the Browser. 1-7 - Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache:
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. 8-14 - Javier López, Ruben Rios, Jorge Cuéllar:
Preserving Receiver-Location Privacy in Wireless Sensor Networks. 15-27 - Pierangela Samarati:
Data Security and Privacy in the Cloud. 28-41 - Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki:
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. 42-59
Network Security
- Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
A CAPTCHA Scheme Based on the Identification of Character Locations. 60-74 - Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo:
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. 75-89 - Yi Tang, Piaoping Lin, Zhaokai Luo:
Obfuscating Encrypted Web Traffic with Combined Objects. 90-104 - Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei:
A Website Credibility Assessment Scheme Based on Page Association. 105-118
System Security
- Chien-Ming Chen, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun:
A Methodology for Hook-Based Kernel Level Rootkits. 119-128 - Mehari Msgna, Konstantinos Markantonakis, Keith Mayes:
Precise Instruction-Level Side Channel Profiling of Embedded Processors. 129-143 - Weijin Wang, Yu Qin, Dengguo Feng:
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model. 144-158 - Yonggan Hou, Jianwei Zhuge, Dan Xin, Wenya Feng:
SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine. 159-171 - Hongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang:
HDROP: Detecting ROP Attacks Using Performance Monitoring Counters. 172-186
Security Practice
- Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng:
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. 187-201 - Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu:
High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. 202-216 - Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu:
A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm. 217-231 - Danhui Wang, An Wang, Xuexin Zheng:
Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. 232-246 - Jing Wang, Le Guan, Limin Liu, Daren Zha:
Implementing a Covert Timing Channel Based on Mimic Function. 247-261 - Hongmei Liu, Songtao Li, Shan Bian:
Detecting Frame Deletion in H.264 Video. 262-270
Security Protocols
- Vandana Guleria, Ratna Dutta:
Efficient Adaptive Oblivious Transfer in UC Framework. 271-286 - Jun Zhang, Xinran Li, Fang-Wei Fu:
Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes. 287-301 - Mehrdad Nojoumian, Douglas R. Stinson:
Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing. 302-317 - Jie Zhang, Futai Zhang:
Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups. 318-329
Cloud Security
- Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:
Proofs of Retrievability Based on MRD Codes. 330-345 - Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. 346-358 - Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. 359-372 - Jiageng Chen, Atsuko Miyaji, Chunhua Su:
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database. 373-387
Digital Signatures
- Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer:
A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. 388-402 - Man Ho Au, Willy Susilo:
Two-Party (Blind) Ring Signatures and Their Applications. 403-417 - Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. 418-432 - Kefeng Wang, Yi Mu, Willy Susilo, Fuchun Guo:
Attribute-Based Signature with Message Recovery. 433-447
Encryption and Key Agreement
- Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. 448-461 - Puwen Wei, Yuliang Zheng, Wei Wang:
Multi-recipient Encryption in Heterogeneous Setting. 462-480 - Mingwu Zhang:
ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage. 481-495 - Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu, Wenchang Shi:
Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. 496-510
Theory
- Wulu Li:
New Variants of Lattice Problems and Their NP-Hardness. 511-523 - Ronglin Hao, Bao Li, Bingke Ma, Xiaoqian Li:
Improved Preimage Attacks against Reduced HAS-160. 524-536 - Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng:
Modular Inversion Hidden Number Problem Revisited. 537-551 - Hong Xu, Lin Tan, Xuejia Lai:
On the Recursive Construction of MDS Matrices for Lightweight Cryptography. 552-563 - Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of Circulant MDS Matrices for Lightweight Cryptography. 564-576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.