


default search action
22. ACISP 2017: Auckland, New Zealand
- Josef Pieprzyk, Suriadi Suriadi:

Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10343, Springer 2017, ISBN 978-3-319-59869-7
Symmetric Cryptography
- Sumanta Sarkar, Habeeb Syed:

Analysis of Toeplitz MDS Matrices. 3-18 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:

Reforgeability of Authenticated Encryption Schemes. 19-37 - Yusuke Naito:

Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations. 38-57
Software Security
- Fan Jiang, Cen Zhang, Shaoyin Cheng:

FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability. 61-79 - Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang, Yingjiao Niu:

Splitting Third-Party Libraries' Privileges from Android Apps. 80-94 - Yan Lin

, Xiaoxiao Tang, Debin Gao
:
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking. 95-112
Network Security
- Jean-Guillaume Dumas

, Vincent Zucca:
Prover Efficient Public Verification of Dense or Sparse/Structured Matrix-Vector Multiplication. 115-134 - Weizhong Qiang, JiaZhen Guo, Hai Jin, Weifeng Li:

JSFfox: Run-Timely Confining JavaScript for Firefox. 135-150
Malware Detection
- Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu, Qiaolin Hu:

PriMal: Cloud-Based Privacy-Preserving Malware Detection. 153-172 - Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu, Yi Wang, Qiang Yang:

A New Malware Classification Approach Based on Malware Dynamic Analysis. 173-189
Privacy
- Keita Emura

:
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions. 193-213 - Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu, Ye Wang:

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data. 214-234 - Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu

, Su Peng:
Private Graph Intersection Protocol. 235-248 - Mousumi Akter, Tanzima Hashem

:
Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy. 249-260 - Alex Davidson, Carlos Cid:

An Efficient Toolkit for Computing Private Set Operations. 261-278
Authentication
- Yangguang Tian, Shiwei Zhang, Guomin Yang

, Yi Mu, Yong Yu
:
Privacy-Preserving k-time Authenticated Secret Handshakes. 281-300 - Weizhi Meng

, Lee Wang Hao, Man Ho Au
, Zhe Liu:
Exploring Effect of Location Number on Map-Based Graphical Password Authentication. 301-313 - Yang-Wai Chow

, Willy Susilo
, Joseph Tonien
, Wei Zong
:
A QR Code Watermarking Approach Based on the DWT-DCT Technique. 314-331
Elliptic Curve Cryptography
- Theo Fanuela Prabowo

, Chik How Tan:
Generating Complete Edwards Curves. 335-348 - Eunkyung Kim, Mehdi Tibouchi

:
Secure GLS Recomposition for Sum-of-Square Cofactors. 349-365 - Reza Rezaeian Farashahi

, Seyed Gholamhossein Hosseini:
Differential Addition on Twisted Edwards Curves. 366-378
Short Papers
- Abhishek Singh, Binanda Sengupta

, Sushmita Ruj
:
Certificate Transparency with Enhancements and Short Proofs. 381-389 - Moritz Horsch, Johannes Braun, Dominique Metz, Johannes Buchmann:

Update-Tolerant and Revocable Password Backup. 390-397 - Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm

, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach
:
Redactable Graph Hashing, Revisited - (Extended Abstract). 398-405 - Swapan Maiti, Shamit Ghosh, Dipanwita Roy Chowdhury:

On the Security of Designing a Cellular Automata Based Stream Cipher. 406-413 - Clark D. Thomborson

, Marc Jeanmougin
:
Stegogames. 414-421 - Dwight Horne, Suku Nair:

A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes. 422-434 - Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin, Shizhen Wang, Guozhong Sun:

Fully Context-Sensitive CFI for COTS Binaries. 435-442 - Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu, Dingding Jia:

Dual-Mode Cryptosystem Based on the Learning with Errors Problem. 443-451 - Nicholas R. Rodofile, Thomas Schmidt, Sebastian T. Sherry, Christopher Djamaludin, Kenneth Radke, Ernest Foo

:
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure. 452-459 - Jason H. M. Ying, Noboru Kunihiro

:
Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme. 460-467

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














