Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2018.bht:"
@inproceedings{DBLP:conf/acisp/AhmadiSA18, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini and Md. Mamunur Rashid Akand}, editor = {Willy Susilo and Guomin Yang}, title = {New Attacks and Secure Design for Anonymous Distance-Bounding}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {598--616}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_34}, doi = {10.1007/978-3-319-93638-3\_34}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AhmadiSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AnadaKMW18, author = {Hiroaki Anada and Akira Kanaoka and Natsume Matsuzaki and Yohei Watanabe}, editor = {Willy Susilo and Guomin Yang}, title = {Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {341--359}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_20}, doi = {10.1007/978-3-319-93638-3\_20}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AnadaKMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BarbarSZCX18, author = {Mohamad Barbar and Yulei Sui and Hongyu Zhang and Shiping Chen and Jingling Xue}, editor = {Willy Susilo and Guomin Yang}, title = {Live Path {CFI} Against Control Flow Hijacking Attacks}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {768--779}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_45}, doi = {10.1007/978-3-319-93638-3\_45}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BarbarSZCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoyenH18, author = {Xavier Boyen and Thomas Haines}, editor = {Willy Susilo and Guomin Yang}, title = {Forward-Secure Linkable Ring Signatures}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {245--264}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_15}, doi = {10.1007/978-3-319-93638-3\_15}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoyenH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CheonJKL18, author = {Jung Hee Cheon and Jinhyuck Jeong and Dongwoo Kim and Jongchan Lee}, editor = {Willy Susilo and Guomin Yang}, title = {A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {28--44}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_3}, doi = {10.1007/978-3-319-93638-3\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CheonJKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiHX018, author = {Jie Cui and Jiantao He and Yan Xu and Hong Zhong}, editor = {Willy Susilo and Guomin Yang}, title = {{TDDAD:} Time-Based Detection and Defense Scheme Against DDoS Attack on {SDN} Controller}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {649--665}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_37}, doi = {10.1007/978-3-319-93638-3\_37}, timestamp = {Wed, 20 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiHX018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DavidDL18, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, editor = {Willy Susilo and Guomin Yang}, title = {21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {45--63}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_4}, doi = {10.1007/978-3-319-93638-3\_4}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DavidDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DingFR18, author = {Jintai Ding and Scott R. Fluhrer and Saraswathy RV}, editor = {Willy Susilo and Guomin Yang}, title = {Complete Attack on {RLWE} Key Exchange with Reused Keys, Without Signal Leakage}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {467--486}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_27}, doi = {10.1007/978-3-319-93638-3\_27}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DingFR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Heys18, author = {Howard M. Heys}, editor = {Willy Susilo and Guomin Yang}, title = {Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode)}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {135--153}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_9}, doi = {10.1007/978-3-319-93638-3\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Heys18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuLCL18, author = {Ziyuan Hu and Shengli Liu and Kefei Chen and Joseph K. Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {265--283}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_16}, doi = {10.1007/978-3-319-93638-3\_16}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuLCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuZ18, author = {Kexin Hu and Zhenfeng Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Fast Lottery-Based Micropayments for Decentralized Currencies}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {669--686}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_38}, doi = {10.1007/978-3-319-93638-3\_38}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ItoM18, author = {Ryoma Ito and Atsuko Miyaji}, editor = {Willy Susilo and Guomin Yang}, title = {New Iterated {RC4} Key Correlations}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {154--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_10}, doi = {10.1007/978-3-319-93638-3\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ItoM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KikuchiIMHC18, author = {Ryo Kikuchi and Dai Ikarashi and Takahiro Matsuda and Koki Hamada and Koji Chida}, editor = {Willy Susilo and Guomin Yang}, title = {Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {64--82}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_5}, doi = {10.1007/978-3-319-93638-3\_5}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/KikuchiIMHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KilincV18, author = {Handan Kilin{\c{c}} and Serge Vaudenay}, editor = {Willy Susilo and Guomin Yang}, title = {Secure Contactless Payment}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {579--597}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_33}, doi = {10.1007/978-3-319-93638-3\_33}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KilincV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimLP18, author = {Eunkyung Kim and Hyang{-}Sook Lee and Jeongeun Park}, editor = {Willy Susilo and Guomin Yang}, title = {Towards Round-Optimal Secure Multiparty Computations: Multikey {FHE} Without a {CRS}}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {101--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_7}, doi = {10.1007/978-3-319-93638-3\_7}, timestamp = {Tue, 26 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiHAM18, author = {Junzuo Lai and Zhengan Huang and Man Ho Au and Xianping Mao}, editor = {Willy Susilo and Guomin Yang}, title = {Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {805--812}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_49}, doi = {10.1007/978-3-319-93638-3\_49}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiHAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiYYCD18, author = {Qiqi Lai and Bo Yang and Yong Yu and Yuan Chen and Liju Dong}, editor = {Willy Susilo and Guomin Yang}, title = {Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {539--557}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_31}, doi = {10.1007/978-3-319-93638-3\_31}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiYYCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LauT18, author = {Terry Shue Chien Lau and Chik How Tan}, editor = {Willy Susilo and Guomin Yang}, title = {A New Encryption Scheme Based on Rank Metric Codes}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {750--758}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_43}, doi = {10.1007/978-3-319-93638-3\_43}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LauT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeWZ18, author = {Hyung Tae Lee and Huaxiong Wang and Kai Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Security Analysis and Modification of ID-Based Encryption with Equality Test from {ACISP} 2017}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {780--786}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_46}, doi = {10.1007/978-3-319-93638-3\_46}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiLNP18, author = {Haoyu Li and Renzhang Liu and Abderrahmane Nitaj and Yanbin Pan}, editor = {Willy Susilo and Guomin Yang}, title = {Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {455--466}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_26}, doi = {10.1007/978-3-319-93638-3\_26}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiLNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiLX18, author = {Shimin Li and Bei Liang and Rui Xue}, editor = {Willy Susilo and Guomin Yang}, title = {Private Functional Signatures: Definition and Construction}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {284--303}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_17}, doi = {10.1007/978-3-319-93638-3\_17}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuCWW18, author = {Chi Liu and Rongmao Chen and Yi Wang and Yongjun Wang}, editor = {Willy Susilo and Guomin Yang}, title = {Asymmetric Subversion Attacks on Signature Schemes}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {376--395}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_22}, doi = {10.1007/978-3-319-93638-3\_22}, timestamp = {Thu, 21 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuCWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18, author = {Lin Liu and Jinshu Su and Rongmao Chen and Ximeng Liu and Xiaofeng Wang and Shuhui Chen and Ho{-}fung Leung}, editor = {Willy Susilo and Guomin Yang}, title = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {431--451}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_25}, doi = {10.1007/978-3-319-93638-3\_25}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuZA18, author = {Xingye Lu and Zhenfei Zhang and Man Ho Au}, editor = {Willy Susilo and Guomin Yang}, title = {Practical Signatures from the Partial Fourier Recovery Problem Revisited: {A} Provably-Secure and Gaussian-Distributed Construction}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {813--820}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_50}, doi = {10.1007/978-3-319-93638-3\_50}, timestamp = {Tue, 10 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LuZA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaWL18, author = {Xuecheng Ma and Xin Wang and Dongdai Lin}, editor = {Willy Susilo and Guomin Yang}, title = {Anonymous Identity-Based Encryption with Identity Recovery}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {360--375}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_21}, doi = {10.1007/978-3-319-93638-3\_21}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MarriereNV18, author = {Nicolas Marri{\`{e}}re and Val{\'{e}}rie Nachef and Emmanuel Volte}, editor = {Willy Susilo and Guomin Yang}, title = {Differential Attacks on Reduced Round {LILLIPUT}}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {188--206}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_12}, doi = {10.1007/978-3-319-93638-3\_12}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MarriereNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MengWLLLP18, author = {Weizhi Meng and Yu Wang and Wenjuan Li and Zhe Liu and Jin Li and Christian W. Probst}, editor = {Willy Susilo and Guomin Yang}, title = {Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {759--767}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_44}, doi = {10.1007/978-3-319-93638-3\_44}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MengWLLLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Naito18, author = {Yusuke Naito}, editor = {Willy Susilo and Guomin Yang}, title = {Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {225--242}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_14}, doi = {10.1007/978-3-319-93638-3\_14}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Naito18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PaulS18, author = {Souradyuti Paul and Ananya Shrivastava}, editor = {Willy Susilo and Guomin Yang}, title = {Robust Multiparty Computation with Faster Verification Time}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {114--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_8}, doi = {10.1007/978-3-319-93638-3\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PaulS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengLKZH18, author = {Liqiang Peng and Yao Lu and Noboru Kunihiro and Rui Zhang and Lei Hu}, editor = {Willy Susilo and Guomin Yang}, title = {A Deterministic Algorithm for Computing Divisors in an Interval}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {3--12}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_1}, doi = {10.1007/978-3-319-93638-3\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengLKZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SarkarBN18, author = {Pinaki Sarkar and Mayank Baranwal and Sukumar Nandi}, editor = {Willy Susilo and Guomin Yang}, title = {{CRT-KPS:} {A} Key Predistribution Schemes Using {CRT}}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {821--830}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_51}, doi = {10.1007/978-3-319-93638-3\_51}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SarkarBN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SarkarS18, author = {Sumanta Sarkar and Habeeb Syed}, editor = {Willy Susilo and Guomin Yang}, title = {Bounds on Differential and Linear Branch Number of Permutations}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {207--224}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_13}, doi = {10.1007/978-3-319-93638-3\_13}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SarkarS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShenL0HCZ18, author = {Jian Shen and Dengzhi Liu and Xiaofeng Chen and Xinyi Huang and Jiageng Chen and Mingwu Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {417--430}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_24}, doi = {10.1007/978-3-319-93638-3\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ShenL0HCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunCHC18, author = {Yeali S. Sun and Chien{-}Chun Chen and Shun{-}Wen Hsiao and Meng Chang Chen}, editor = {Willy Susilo and Guomin Yang}, title = {ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {796--804}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_48}, doi = {10.1007/978-3-319-93638-3\_48}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunCHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunZF18, author = {Yinxia Sun and Futai Zhang and Anmin Fu}, editor = {Willy Susilo and Guomin Yang}, title = {Revocable Certificateless Encryption with Ciphertext Evolution}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {741--749}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_42}, doi = {10.1007/978-3-319-93638-3\_42}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SunZF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TorresSSLKBAC18, author = {Wilson Abel Alberto Torres and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Veronika Kuchta and Nandita Bhattacharjee and Man Ho Au and Jacob Cheng}, editor = {Willy Susilo and Guomin Yang}, title = {Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {558--576}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_32}, doi = {10.1007/978-3-319-93638-3\_32}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TorresSSLKBAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangIDT18, author = {Yacheng Wang and Yasuhiko Ikematsu and Dung Hoang Duong and Tsuyoshi Takagi}, editor = {Willy Susilo and Guomin Yang}, title = {Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {487--501}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_28}, doi = {10.1007/978-3-319-93638-3\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangIDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangT18, author = {Yuntao Wang and Tsuyoshi Takagi}, editor = {Willy Susilo and Guomin Yang}, title = {Improving the {BKZ} Reduction Algorithm by Quick Reordering Technique}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {787--795}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_47}, doi = {10.1007/978-3-319-93638-3\_47}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WenL18, author = {Yunhua Wen and Shengli Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Reusable Fuzzy Extractor from {LWE}}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {13--27}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_2}, doi = {10.1007/978-3-319-93638-3\_2}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XiaS0ZZ18, author = {Zhe Xia and Liuying Sun and Bo Yang and Yanwei Zhou and Mingwu Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {83--100}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_6}, doi = {10.1007/978-3-319-93638-3\_6}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XiaS0ZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuDC018, author = {Yan Xu and Ran Ding and Jie Cui and Hong Zhong}, editor = {Willy Susilo and Guomin Yang}, title = {Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {399--416}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_23}, doi = {10.1007/978-3-319-93638-3\_23}, timestamp = {Wed, 20 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/XuDC018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangAXY18, author = {Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu}, editor = {Willy Susilo and Guomin Yang}, title = {Decentralized Blacklistable Anonymous Credentials with Reputation}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {720--738}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_41}, doi = {10.1007/978-3-319-93638-3\_41}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangAXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YeT18, author = {Chen{-}Dong Ye and Tian Tian}, editor = {Willy Susilo and Guomin Yang}, title = {A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {172--187}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_11}, doi = {10.1007/978-3-319-93638-3\_11}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YeT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YinWZL18, author = {Jiayuan Yin and Changren Wang and Zongyang Zhang and Jianwei Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Revisiting the Incentive Mechanism of Bitcoin-NG}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {706--719}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_40}, doi = {10.1007/978-3-319-93638-3\_40}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YinWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuAYLX18, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang and Junzuo Lai and Qiuliang Xu}, editor = {Willy Susilo and Guomin Yang}, title = {Lattice-Based Universal Accumulator with Nonmembership Arguments}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {502--519}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_29}, doi = {10.1007/978-3-319-93638-3\_29}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuAYLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZengLYXW18, author = {Yali Zeng and Xu Li and Xu Yang and Qikui Xu and Dongcheng Wang}, editor = {Willy Susilo and Guomin Yang}, title = {A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {634--648}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_36}, doi = {10.1007/978-3-319-93638-3\_36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZengLYXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLLLG18, author = {Yuncong Zhang and Yu Long and Zhen Liu and Zhiqiang Liu and Dawu Gu}, editor = {Willy Susilo and Guomin Yang}, title = {Z-Channel: Scalable and Efficient Scheme in Zerocash}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {687--705}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_39}, doi = {10.1007/978-3-319-93638-3\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLLLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangZLLXL18, author = {Daode Zhang and Kai Zhang and Bao Li and Xianhui Lu and Haiyang Xue and Jie Li}, editor = {Willy Susilo and Guomin Yang}, title = {Lattice-Based Dual Receiver Encryption and More}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {520--538}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_30}, doi = {10.1007/978-3-319-93638-3\_30}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangZLLXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhengWQZHL18, author = {Haibin Zheng and Qianhong Wu and Bo Qin and Lin Zhong and Shuangyu He and Jianwei Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Linkable Group Signature for Auditing Anonymous Communication}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {304--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_18}, doi = {10.1007/978-3-319-93638-3\_18}, timestamp = {Wed, 29 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhengWQZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhongWQZL18, author = {Lin Zhong and Qianhong Wu and Bo Qin and Haibin Zheng and Jianwei Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Auditable Hierarchy-Private Public-Key Encryption}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {322--340}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_19}, doi = {10.1007/978-3-319-93638-3\_19}, timestamp = {Wed, 29 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhongWQZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZouDL018, author = {Deqing Zou and Zhijun Deng and Zhen Li and Hai Jin}, editor = {Willy Susilo and Guomin Yang}, title = {Automatically Identifying Security Bug Reports via Multitype Features Analysis}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {619--633}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_35}, doi = {10.1007/978-3-319-93638-3\_35}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZouDL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2018, editor = {Willy Susilo and Guomin Yang}, title = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3}, doi = {10.1007/978-3-319-93638-3}, isbn = {978-3-319-93637-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.