Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/atis/atis2020.bht:"
@inproceedings{DBLP:conf/atis/AlzakariV20, author = {Sarah A. Alzakari and Poorvi L. Vora}, editor = {Lejla Batina and Gang Li}, title = {Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round {SPARX} Cipher}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {108--121}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_8}, doi = {10.1007/978-981-33-4706-9\_8}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/AlzakariV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/BeightonBSW20, author = {Matthew Beighton and Harry Bartlett and Leonie Simpson and Kenneth Koon{-}Ho Wong}, editor = {Lejla Batina and Gang Li}, title = {Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {42--60}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_4}, doi = {10.1007/978-981-33-4706-9\_4}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/BeightonBSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/JiWHL20, author = {Wenping Ji and Jian Wang and Xudong He and Jiqiang Liu}, editor = {Lejla Batina and Gang Li}, title = {Malware Analysis Method Based Random Access Memory in Android}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {78--94}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_6}, doi = {10.1007/978-981-33-4706-9\_6}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/JiWHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/LiXLM20, author = {Lin Li and Chungen Xu and Zhongyi Liu and Lin Mei}, editor = {Lejla Batina and Gang Li}, title = {Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {14--28}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_2}, doi = {10.1007/978-981-33-4706-9\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/LiXLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/MooneyBZ20, author = {Digby Mooney and Lynn Margaret Batten and Leo Yu Zhang}, editor = {Lejla Batina and Gang Li}, title = {A New Rabin-Type Cryptosystem with Modulus p\({}^{\mbox{2}}\)q}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {61--77}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_5}, doi = {10.1007/978-981-33-4706-9\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/MooneyBZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/NerwichGPN20, author = {Mark Nerwich and Praveen Gauravaram and Hye{-}young Paik and Surya Nepal}, editor = {Lejla Batina and Gang Li}, title = {Vulnerability Database as a Service for IoT}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {95--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_7}, doi = {10.1007/978-981-33-4706-9\_7}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/NerwichGPN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/SureshS20, author = {Anjali J. Suresh and Sriram Sankaran}, editor = {Lejla Batina and Gang Li}, title = {A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {1--13}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_1}, doi = {10.1007/978-981-33-4706-9\_1}, timestamp = {Thu, 14 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/SureshS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/ViswanathanB20, author = {Sowmya Vishvanathan and Zubair A. Baig}, editor = {Lejla Batina and Gang Li}, title = {Digital Forensics for Drones: {A} Study of Tools and Techniques}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {29--41}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_3}, doi = {10.1007/978-981-33-4706-9\_3}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/ViswanathanB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atis/2020, editor = {Lejla Batina and Gang Li}, title = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9}, doi = {10.1007/978-981-33-4706-9}, isbn = {978-981-33-4705-2}, timestamp = {Thu, 14 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.