


default search action
10th ISPEC 2014: Fuzhou, China
- Xinyi Huang, Jianying Zhou

:
Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Lecture Notes in Computer Science 8434, Springer 2014, ISBN 978-3-319-06319-5
Invited Papers from Keynote Speakers
- Dieter Gollmann:

Access Control in and Around the Browser. 1-7 - Michel Abdalla

, Hervé Chabanne
, Houda Ferradi, Julien Jainski, David Naccache:
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. 8-14 - Javier López

, Ruben Rios, Jorge Cuéllar:
Preserving Receiver-Location Privacy in Wireless Sensor Networks. 15-27 - Pierangela Samarati

:
Data Security and Privacy in the Cloud. 28-41 - Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak

, Lukasz Krzywiecki
:
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. 42-59
Network Security
- Vu Duc Nguyen, Yang-Wai Chow

, Willy Susilo
:
A CAPTCHA Scheme Based on the Identification of Character Locations. 60-74 - Yuede Ji, Yukun He, Dewei Zhu, Qiang Li

, Dong Guo:
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. 75-89 - Yi Tang, Piaoping Lin, Zhaokai Luo:

Obfuscating Encrypted Web Traffic with Combined Objects. 90-104 - Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei:

A Website Credibility Assessment Scheme Based on Page Association. 105-118
System Security
- Chien-Ming Chen

, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun:
A Methodology for Hook-Based Kernel Level Rootkits. 119-128 - Mehari Msgna, Konstantinos Markantonakis

, Keith Mayes:
Precise Instruction-Level Side Channel Profiling of Embedded Processors. 129-143 - Weijin Wang

, Yu Qin, Dengguo Feng:
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model. 144-158 - Yonggan Hou, Jianwei Zhuge, Dan Xin, Wenya Feng:

SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine. 159-171 - Hongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang:

HDROP: Detecting ROP Attacks Using Performance Monitoring Counters. 172-186
Security Practice
- Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng:

Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. 187-201 - Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu:

High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. 202-216 - Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu:

A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm. 217-231 - Danhui Wang, An Wang, Xuexin Zheng:

Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. 232-246 - Jing Wang, Le Guan, Limin Liu, Daren Zha:

Implementing a Covert Timing Channel Based on Mimic Function. 247-261 - Hongmei Liu, Songtao Li, Shan Bian:

Detecting Frame Deletion in H.264 Video. 262-270
Security Protocols
- Vandana Guleria, Ratna Dutta:

Efficient Adaptive Oblivious Transfer in UC Framework. 271-286 - Jun Zhang, Xinran Li, Fang-Wei Fu:

Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes. 287-301 - Mehrdad Nojoumian, Douglas R. Stinson:

Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing. 302-317 - Jie Zhang, Futai Zhang:

Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups. 318-329
Cloud Security
- Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:

Proofs of Retrievability Based on MRD Codes. 330-345 - Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu

:
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. 346-358 - Yong Yu

, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. 359-372 - Jiageng Chen

, Atsuko Miyaji
, Chunhua Su:
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database. 373-387
Digital Signatures
- Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer

:
A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. 388-402 - Man Ho Au

, Willy Susilo
:
Two-Party (Blind) Ring Signatures and Their Applications. 403-417 - Fei Tang, Hongda Li, Qihua Niu, Bei Liang:

Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. 418-432 - Kefeng Wang, Yi Mu, Willy Susilo

, Fuchun Guo
:
Attribute-Based Signature with Message Recovery. 433-447
Encryption and Key Agreement
- Kaitai Liang

, Man Ho Au
, Willy Susilo
, Duncan S. Wong, Guomin Yang
, Yong Yu
:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. 448-461 - Puwen Wei, Yuliang Zheng

, Wei Wang:
Multi-recipient Encryption in Heterogeneous Setting. 462-480 - Mingwu Zhang:

ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage. 481-495 - Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu

, Wenchang Shi:
Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. 496-510
Theory
- Wulu Li:

New Variants of Lattice Problems and Their NP-Hardness. 511-523 - Ronglin Hao, Bao Li, Bingke Ma, Xiaoqian Li:

Improved Preimage Attacks against Reduced HAS-160. 524-536 - Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng:

Modular Inversion Hidden Number Problem Revisited. 537-551 - Hong Xu, Lin Tan, Xuejia Lai:

On the Recursive Construction of MDS Matrices for Lightweight Cryptography. 552-563 - Kishan Chand Gupta, Indranil Ghosh Ray:

On Constructions of Circulant MDS Matrices for Lightweight Cryptography. 564-576

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














