Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iccsp/iccsp2020.bht:"
@inproceedings{DBLP:conf/iccsp/AiDG20, author = {Chengwei Ai and Weiyu Dong and Zicong Gao}, title = {A Novel Concolic Execution Approach on Embedded Device}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {47--52}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377654}, doi = {10.1145/3377644.3377654}, timestamp = {Thu, 30 Apr 2020 16:20:40 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/AiDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/Chen20, author = {Hui Chen}, title = {Quantum Relay Blockchain and Its Applications in Key Service}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {95--99}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377657}, doi = {10.1145/3377644.3377657}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/Chen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/ChenCSDW20, author = {Jing Chen and Zhenfu Cao and Jiachen Shen and Xiaolei Dong and Xingkai Wang}, title = {Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {24--30}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377666}, doi = {10.1145/3377644.3377666}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/ChenCSDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/ChenZLJ20, author = {Tao Chen and Guangming Zhou and Zhangpu Liu and Tao Jing}, title = {A Novel Ensemble Anomaly based Approach for Command and Control Channel Detection}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {74--78}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377652}, doi = {10.1145/3377644.3377652}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/ChenZLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/CuiLYY20, author = {Zhouping Cui and Weihai Li and Chaohai Yu and Nenghai Yu}, title = {A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {68--73}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377651}, doi = {10.1145/3377644.3377651}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/CuiLYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/DingHLGC20, author = {Wei Ding and Zidong Hua and Panhui Li and Qiushi Gong and Yuxi Cheng}, title = {Botnet Host Detection Based on Heartbeat Association}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {42--46}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377653}, doi = {10.1145/3377644.3377653}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/DingHLGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/Duong-TrungSLP20, author = {Nghia Duong{-}Trung and Ha Xuan Son and Hai Trieu Le and Tan Tai Phan}, title = {On Components of a Patient-centered Healthcare System Using Smart Contract}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {31--35}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377668}, doi = {10.1145/3377644.3377668}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/Duong-TrungSLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/Duong-TrungSLP20a, author = {Nghia Duong{-}Trung and Ha Xuan Son and Hai Trieu Le and Tan Tai Phan}, title = {Smart Care: Integrating Blockchain Technology into the Design of Patient-centered Healthcare Systems}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {105--109}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377667}, doi = {10.1145/3377644.3377667}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/Duong-TrungSLP20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LaiL20, author = {Enmei Lai and Wenjun Luo}, title = {Static Analysis of Integer Overflow of Smart Contracts in Ethereum}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {110--115}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377650}, doi = {10.1145/3377644.3377650}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LaiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LinJAC20, author = {Jian Lin and Liehui Jiang and Chengwei Ai and Shihong Chao}, title = {A Shape-inference-based Approach to Enhance Constraint Independence Optimization}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {141--145}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377665}, doi = {10.1145/3377644.3377665}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LinJAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LiuWL20, author = {Fukang Liu and Guorui Wu and Yang Liu}, title = {A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {63--67}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377648}, doi = {10.1145/3377644.3377648}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LiuWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LiuZ20, author = {Kunyu Liu and Liang Zhou}, title = {Routing Authentication Chain Mechanism to Resist {AODV} Black Hole Attacks}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {53--57}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377658}, doi = {10.1145/3377644.3377658}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/LiuZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LongX20, author = {Yihong Long and Feng Xiong}, title = {Secret Sharing Based {BLMQ} Signature Generation}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {6--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377655}, doi = {10.1145/3377644.3377655}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LongX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/MengRTYY20, author = {Lianxiao Meng and Shuangyin Ren and Gaigai Tang and Chao Yang and Wu Yang}, title = {{UAV} Sensor Spoofing Detection Algorithm Based on {GPS} and Optical Flow Fusion}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {146--151}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377670}, doi = {10.1145/3377644.3377670}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/MengRTYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/OcenasHHM20, author = {Martin Ocenas and Ivan Homoliak and Petr Han{\'{a}}cek and Kamil Malinka}, title = {Security and Encryption at Modern Databases}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {19--23}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377662}, doi = {10.1145/3377644.3377662}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/OcenasHHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/Pitigalaarachchi20, author = {Pansilu Pitigalaarachchi and Chandana Gamage}, title = {Efficiency Enhancements for Practical Techniques for Searches on Encrypted Data}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {13--18}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377661}, doi = {10.1145/3377644.3377661}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/Pitigalaarachchi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/SunGZ20, author = {Zedong Sun and Chunxiang Gu and Yonghui Zheng}, title = {Block Sieve Reduction: {A} New Random Sampling Reduction Algorithm Based on Sieve Algorithms}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {1--5}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377649}, doi = {10.1145/3377644.3377649}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/SunGZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/Wang20, author = {Yonghao Wang}, title = {A Trust Management Model for Internet of Vehicles}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {136--140}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377664}, doi = {10.1145/3377644.3377664}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/Wang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WangRA20, author = {Shuangbao Wang and Matthew Rohde and Amjad Ali}, title = {Quantum Cryptography and Simulation: Tools and Techniques}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {36--41}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377671}, doi = {10.1145/3377644.3377671}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/WangRA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WangW20, author = {Quanmin Wang and Xuan Wei}, title = {The Detection of Network Intrusion Based on Improved Adaboost Algorithm}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {84--88}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377660}, doi = {10.1145/3377644.3377660}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/WangW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WangYC20, author = {Shixuan Wang and Jiabin Yuan and Shudi Chen}, title = {Quality-based Score Level Fusion for Continuous Authentication with Motion Sensor and Face}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {58--62}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377647}, doi = {10.1145/3377644.3377647}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/WangYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WangYY20, author = {Hongman Wang and Yongbin Yuan and Fangchun Yang}, title = {A Personal Data Determination Method Based On Blockchain Technology and Smart Contract}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {89--94}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377656}, doi = {10.1145/3377644.3377656}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/WangYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WangYZL20, author = {Ping Wang and Jinjiang Yang and Min Zhu and Bo Liu}, title = {A High-throughput Low-area Entropy Source Based on Asynchronous Feedback Unit}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {131--135}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377646}, doi = {10.1145/3377644.3377646}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/WangYZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WangZZ20, author = {Yong Wang and Mengge Zhang and Zhengyu Zhu}, title = {Detection of Voice Transformation Disguise Based on Deep Residual Net}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {126--130}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377645}, doi = {10.1145/3377644.3377645}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/WangZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/YanCZBLJ20, author = {Xincheng Yan and Yue Chen and Yuchang Zhai and Yang Ba and Xuewei Li and Hongyong Jia}, title = {An Encryption and Decryption Outsourcing {CP-ABE} scheme Supporting Efficient Ciphertext Evolution}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {116--125}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377669}, doi = {10.1145/3377644.3377669}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/YanCZBLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/YangCZLL20, author = {Zhongxin Yang and Zhifeng Chen and Ping Zhang and Ming Liu and Qingbao Li}, title = {An Information Intelligent Search Method for Computer Forensics Based on Text Similarity}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {79--83}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377659}, doi = {10.1145/3377644.3377659}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/YangCZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/ZhaoHD20, author = {Gang Zhao and Hui He and Bingbing Di}, title = {Design and Implementation of the Digital Education Resources Authentication System Based on Blockchain}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {100--104}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377663}, doi = {10.1145/3377644.3377663}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/ZhaoHD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccsp/2020, title = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644}, doi = {10.1145/3377644}, isbn = {978-1-4503-7744-7}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.