


default search action
12th ISPEC 2016: Zhangjiajie, China
- Feng Bao, Liqun Chen, Robert H. Deng

, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 - Zhan Chen, Huaifeng Chen, Xiaoyun Wang:

Cryptanalysis of Midori128 Using Impossible Differential Techniques. 1-12 - Wenlun Pan, Zhenzhen Bao

, Dongdai Lin, Feng Liu:
The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. 13-36 - Jingguo Bi, Jiayang Liu:

Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013. 37-47 - Jian Zhang, Yawei Zhang, Pin Liu, Jianbiao He:

A Spark-Based DDoS Attack Detection Model in Cloud Services. 48-64 - Jian Zhang, Wenling Wu, Yafei Zheng:

Security of SM4 Against (Related-Key) Differential Cryptanalysis. 65-78 - Henning Kopp, Christoph Bösch, Frank Kargl:

KopperCoin - A Distributed File Storage with Financial Incentives. 79-93 - Zhoujun Ma, Li Yang, Yunlei Zhao:

Practical Signature Scheme from \varGamma Γ -Protocol. 94-109 - Daichi Adachi, Kazumasa Omote:

A Host-Based Detection Method of Remote Access Trojan in the Early Stage. 110-121 - Jian Zhang, Wenling Wu, Yafei Zheng:

Collision Attacks on CAESAR Second-Round Candidate: ELmD. 122-136 - Hong Wei Siew, Saw Chin Tan, Ching Kwang Lee:

Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring. 137-150 - Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang:

Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU. 151-166 - Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng:

Homomorphically Encrypted Arithmetic Operations Over the Integer Ring. 167-181 - Zhongyuan Yao, Yi Mu, Guomin Yang

:
A Privacy Preserving Source Verifiable Encryption Scheme. 182-193 - Huiling Zhang, Wenling Wu:

Structural Evaluation for Simon-Like Designs Against Integral Attack. 194-208 - Przemyslaw Blaskiewicz, Lukasz Krzywiecki

, Piotr Syga
:
RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. 209-223 - Ge Wu, Yi Mu, Willy Susilo

, Fuchun Guo
:
Privacy-Preserving Cloud Auditing with Multiple Uploaders. 224-237 - Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski:

A Formal Concept of Domain Pseudonymous Signatures. 238-254 - Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:

Efficient Tag Path Authentication Protocol with Less Tag Memory. 255-270 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang:

Anonymizing Bitcoin Transaction. 271-283 - Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji:

Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting. 284-299 - Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia

:
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree. 300-314 - Adel D. Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb:

Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network. 315-329 - Zhuo Wei, Yanjiang Yang, Tieyan Li:

Authenticated CAN Communications Using Standardized Cryptographic Techniques. 330-343 - Simon Cogliani

, Houda Ferradi, Rémi Géraud
, David Naccache:
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography. 344-353 - Hadrien Barral, Houda Ferradi, Rémi Géraud

, Georges-Axel Jaloyan, David Naccache:
ARMv8 Shellcodes from 'A' to 'Z'. 354-377

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














