Search dblp for Publications

export results for "toc:db/conf/iccsp/iccsp2020.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iccsp/AiDG20,
  author       = {Chengwei Ai and
                  Weiyu Dong and
                  Zicong Gao},
  title        = {A Novel Concolic Execution Approach on Embedded Device},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {47--52},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377654},
  doi          = {10.1145/3377644.3377654},
  timestamp    = {Thu, 30 Apr 2020 16:20:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/AiDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Chen20,
  author       = {Hui Chen},
  title        = {Quantum Relay Blockchain and Its Applications in Key Service},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {95--99},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377657},
  doi          = {10.1145/3377644.3377657},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/Chen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ChenCSDW20,
  author       = {Jing Chen and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong and
                  Xingkai Wang},
  title        = {Forward Secure Dynamic Searchable Symmetric Encryption with Lighter
                  Storage},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {24--30},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377666},
  doi          = {10.1145/3377644.3377666},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/ChenCSDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ChenZLJ20,
  author       = {Tao Chen and
                  Guangming Zhou and
                  Zhangpu Liu and
                  Tao Jing},
  title        = {A Novel Ensemble Anomaly based Approach for Command and Control Channel
                  Detection},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {74--78},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377652},
  doi          = {10.1145/3377644.3377652},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/ChenZLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/CuiLYY20,
  author       = {Zhouping Cui and
                  Weihai Li and
                  Chaohai Yu and
                  Nenghai Yu},
  title        = {A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication
                  Using Neural Networks},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {68--73},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377651},
  doi          = {10.1145/3377644.3377651},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/CuiLYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/DingHLGC20,
  author       = {Wei Ding and
                  Zidong Hua and
                  Panhui Li and
                  Qiushi Gong and
                  Yuxi Cheng},
  title        = {Botnet Host Detection Based on Heartbeat Association},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {42--46},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377653},
  doi          = {10.1145/3377644.3377653},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/DingHLGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Duong-TrungSLP20,
  author       = {Nghia Duong{-}Trung and
                  Ha Xuan Son and
                  Hai Trieu Le and
                  Tan Tai Phan},
  title        = {On Components of a Patient-centered Healthcare System Using Smart
                  Contract},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {31--35},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377668},
  doi          = {10.1145/3377644.3377668},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/Duong-TrungSLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Duong-TrungSLP20a,
  author       = {Nghia Duong{-}Trung and
                  Ha Xuan Son and
                  Hai Trieu Le and
                  Tan Tai Phan},
  title        = {Smart Care: Integrating Blockchain Technology into the Design of Patient-centered
                  Healthcare Systems},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {105--109},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377667},
  doi          = {10.1145/3377644.3377667},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/Duong-TrungSLP20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LaiL20,
  author       = {Enmei Lai and
                  Wenjun Luo},
  title        = {Static Analysis of Integer Overflow of Smart Contracts in Ethereum},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {110--115},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377650},
  doi          = {10.1145/3377644.3377650},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/LaiL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LinJAC20,
  author       = {Jian Lin and
                  Liehui Jiang and
                  Chengwei Ai and
                  Shihong Chao},
  title        = {A Shape-inference-based Approach to Enhance Constraint Independence
                  Optimization},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {141--145},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377665},
  doi          = {10.1145/3377644.3377665},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/LinJAC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LiuWL20,
  author       = {Fukang Liu and
                  Guorui Wu and
                  Yang Liu},
  title        = {A Privacy-Preserving Friend Recommendation Mechanism for Online Social
                  Networks},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {63--67},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377648},
  doi          = {10.1145/3377644.3377648},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/LiuWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LiuZ20,
  author       = {Kunyu Liu and
                  Liang Zhou},
  title        = {Routing Authentication Chain Mechanism to Resist {AODV} Black Hole
                  Attacks},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {53--57},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377658},
  doi          = {10.1145/3377644.3377658},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/LiuZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LongX20,
  author       = {Yihong Long and
                  Feng Xiong},
  title        = {Secret Sharing Based {BLMQ} Signature Generation},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {6--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377655},
  doi          = {10.1145/3377644.3377655},
  timestamp    = {Tue, 05 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/LongX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/MengRTYY20,
  author       = {Lianxiao Meng and
                  Shuangyin Ren and
                  Gaigai Tang and
                  Chao Yang and
                  Wu Yang},
  title        = {{UAV} Sensor Spoofing Detection Algorithm Based on {GPS} and Optical
                  Flow Fusion},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {146--151},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377670},
  doi          = {10.1145/3377644.3377670},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/MengRTYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/OcenasHHM20,
  author       = {Martin Ocenas and
                  Ivan Homoliak and
                  Petr Han{\'{a}}cek and
                  Kamil Malinka},
  title        = {Security and Encryption at Modern Databases},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {19--23},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377662},
  doi          = {10.1145/3377644.3377662},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/OcenasHHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Pitigalaarachchi20,
  author       = {Pansilu Pitigalaarachchi and
                  Chandana Gamage},
  title        = {Efficiency Enhancements for Practical Techniques for Searches on Encrypted
                  Data},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377661},
  doi          = {10.1145/3377644.3377661},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/Pitigalaarachchi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/SunGZ20,
  author       = {Zedong Sun and
                  Chunxiang Gu and
                  Yonghui Zheng},
  title        = {Block Sieve Reduction: {A} New Random Sampling Reduction Algorithm
                  Based on Sieve Algorithms},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377649},
  doi          = {10.1145/3377644.3377649},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/SunGZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Wang20,
  author       = {Yonghao Wang},
  title        = {A Trust Management Model for Internet of Vehicles},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {136--140},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377664},
  doi          = {10.1145/3377644.3377664},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/Wang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangRA20,
  author       = {Shuangbao Wang and
                  Matthew Rohde and
                  Amjad Ali},
  title        = {Quantum Cryptography and Simulation: Tools and Techniques},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {36--41},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377671},
  doi          = {10.1145/3377644.3377671},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangRA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangW20,
  author       = {Quanmin Wang and
                  Xuan Wei},
  title        = {The Detection of Network Intrusion Based on Improved Adaboost Algorithm},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {84--88},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377660},
  doi          = {10.1145/3377644.3377660},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangYC20,
  author       = {Shixuan Wang and
                  Jiabin Yuan and
                  Shudi Chen},
  title        = {Quality-based Score Level Fusion for Continuous Authentication with
                  Motion Sensor and Face},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {58--62},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377647},
  doi          = {10.1145/3377644.3377647},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangYC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangYY20,
  author       = {Hongman Wang and
                  Yongbin Yuan and
                  Fangchun Yang},
  title        = {A Personal Data Determination Method Based On Blockchain Technology
                  and Smart Contract},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {89--94},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377656},
  doi          = {10.1145/3377644.3377656},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangYZL20,
  author       = {Ping Wang and
                  Jinjiang Yang and
                  Min Zhu and
                  Bo Liu},
  title        = {A High-throughput Low-area Entropy Source Based on Asynchronous Feedback
                  Unit},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {131--135},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377646},
  doi          = {10.1145/3377644.3377646},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangYZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangZZ20,
  author       = {Yong Wang and
                  Mengge Zhang and
                  Zhengyu Zhu},
  title        = {Detection of Voice Transformation Disguise Based on Deep Residual
                  Net},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {126--130},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377645},
  doi          = {10.1145/3377644.3377645},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/YanCZBLJ20,
  author       = {Xincheng Yan and
                  Yue Chen and
                  Yuchang Zhai and
                  Yang Ba and
                  Xuewei Li and
                  Hongyong Jia},
  title        = {An Encryption and Decryption Outsourcing {CP-ABE} scheme Supporting
                  Efficient Ciphertext Evolution},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {116--125},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377669},
  doi          = {10.1145/3377644.3377669},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/YanCZBLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/YangCZLL20,
  author       = {Zhongxin Yang and
                  Zhifeng Chen and
                  Ping Zhang and
                  Ming Liu and
                  Qingbao Li},
  title        = {An Information Intelligent Search Method for Computer Forensics Based
                  on Text Similarity},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {79--83},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377659},
  doi          = {10.1145/3377644.3377659},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/YangCZLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ZhaoHD20,
  author       = {Gang Zhao and
                  Hui He and
                  Bingbing Di},
  title        = {Design and Implementation of the Digital Education Resources Authentication
                  System Based on Blockchain},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {100--104},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377663},
  doi          = {10.1145/3377644.3377663},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/ZhaoHD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccsp/2020,
  title        = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644},
  doi          = {10.1145/3377644},
  isbn         = {978-1-4503-7744-7},
  timestamp    = {Thu, 30 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics