Search dblp for Publications

export results for "toc:db/conf/asiajcis/asiajcis2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/asiajcis/FanSHJH14,
  author       = {Chun{-}I Fan and
                  Wei{-}Zhe Sun and
                  Shih{-}Wei Huang and
                  Wen{-}Shenq Juang and
                  Jheng{-}Jia Huang},
  title        = {Strongly Privacy-Preserving Communication Protocol for VANETs},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {119--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.24},
  doi          = {10.1109/ASIAJCIS.2014.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanSHJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FanWHTC14,
  author       = {Chun{-}I Fan and
                  Chien{-}Nan Wu and
                  Jen{-}Chun Hsu and
                  Yi{-}Fan Tseng and
                  Wen{-}Tsuen Chen},
  title        = {Anonymous Credential Scheme Supporting Active Revocation},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {127--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.17},
  doi          = {10.1109/ASIAJCIS.2014.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanWHTC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FurutaniBNSKO14,
  author       = {Nobuaki Furutani and
                  Tao Ban and
                  Junji Nakazato and
                  Jumpei Shimamura and
                  Jun Kitazono and
                  Seiichi Ozawa},
  title        = {Detection of DDoS Backscatter Based on Traffic Features of Darknet
                  {TCP} Packets},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {39--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.23},
  doi          = {10.1109/ASIAJCIS.2014.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FurutaniBNSKO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GotoKOO14,
  author       = {Nasato Goto and
                  Akira Kanaoka and
                  Masayuki Okada and
                  Eiji Okamoto},
  title        = {{METRO:} Measurement of End-to-End Route Trust},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.16},
  doi          = {10.1109/ASIAJCIS.2014.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GotoKOO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GuanC14,
  author       = {D. J. Guan and
                  Yu{-}Shan Cheng},
  title        = {Parity Detection for Some Three-Modulus Residue Number System},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {76--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.13},
  doi          = {10.1109/ASIAJCIS.2014.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GuanC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuangC14,
  author       = {Teng Yu Huang and
                  Hung{-}Yu Chien},
  title        = {Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {141--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.31},
  doi          = {10.1109/ASIAJCIS.2014.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuangKY14,
  author       = {Yu{-}Chih Huang and
                  Wen{-}Chung Kuo and
                  Ching{-}Nung Yang},
  title        = {Data Hiding Based on Radix-2},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {170--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.22},
  doi          = {10.1109/ASIAJCIS.2014.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuangKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KikuchiIUYO14,
  author       = {Hiroaki Kikuchi and
                  Kouichi Itoh and
                  Mebae Ushida and
                  Yuji Yamaoka and
                  Takanori Oikawa},
  title        = {Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {164--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.33},
  doi          = {10.1109/ASIAJCIS.2014.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KikuchiIUYO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Kim14,
  author       = {Jihong Kim},
  title        = {On the False Positive Rate of the Bloom Filter in Case of Using Multiple
                  Hash Functions},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {26--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.32},
  doi          = {10.1109/ASIAJCIS.2014.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Kim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuriharaK14,
  author       = {Keiichirou Kurihara and
                  Kazuki Katagishi},
  title        = {A Simple Detection Method for DoS Attacks Based on {IP} Packets Entropy
                  Values},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {44--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.20},
  doi          = {10.1109/ASIAJCIS.2014.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuriharaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuzunoM14,
  author       = {Hiroki Kuzuno and
                  Kenichi Magata},
  title        = {Detecting Advertisement Module Network Behavior with Graph Modeling},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.26},
  doi          = {10.1109/ASIAJCIS.2014.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuzunoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiLZ14,
  author       = {Juanjuan Li and
                  Zhenhua Liu and
                  Longhui Zu},
  title        = {Chosen-Ciphertext Secure Multi-use Unidirectional Attribute-Based
                  Proxy Re-Encryptions},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {96--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.15},
  doi          = {10.1109/ASIAJCIS.2014.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LinLLC14,
  author       = {Chu{-}Hsing Lin and
                  Jung{-}Chun Liu and
                  Cheng{-}Chieh Li and
                  Po{-}Wei Chu},
  title        = {Parallel Modulus Operations in {RSA} Encryption by {CPU/GPU} Hybrid
                  Computation},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {71--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.25},
  doi          = {10.1109/ASIAJCIS.2014.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LinLLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiuYL14,
  author       = {Zengguang Liu and
                  Xiaochun Yin and
                  Hoonjae Lee},
  title        = {An Efficient Defense Scheme against {SIP} DoS Attack in {SDN} Using
                  Cloud {SFW}},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {52--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.12},
  doi          = {10.1109/ASIAJCIS.2014.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiuYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MatsumotoS14,
  author       = {Shinichi Matsumoto and
                  Kouichi Sakurai},
  title        = {Acquisition of Evidence of Web Storage in {HTML5} Web Browsers from
                  Memory Image},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {148--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.30},
  doi          = {10.1109/ASIAJCIS.2014.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MatsumotoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MatsunakaKK14,
  author       = {Takashi Matsunaka and
                  Ayumu Kubota and
                  Takahiro Kasama},
  title        = {An Approach to Detect Drive-By Download by Observing the Web Page
                  Transition Behaviors},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {19--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.21},
  doi          = {10.1109/ASIAJCIS.2014.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MatsunakaKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MiyajiRS14,
  author       = {Atsuko Miyaji and
                  Mazumder Rashed and
                  Tsuyoshi Sawada},
  title        = {A New (n, n) Blockcipher Hash Function: Apposite for Short Messages},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {56--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.27},
  doi          = {10.1109/ASIAJCIS.2014.27},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MiyajiRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/PengRZC14,
  author       = {Shengbo Peng and
                  Ou Ruan and
                  Jing Zhou and
                  Zaixing Chen},
  title        = {A New Identity-Based Authentication Scheme for {SIP}},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {90--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.14},
  doi          = {10.1109/ASIAJCIS.2014.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/PengRZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/QiuHL14,
  author       = {Junjie Qiu and
                  Gi{-}Hyun Hwang and
                  Hoonjae Lee},
  title        = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {104--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.11},
  doi          = {10.1109/ASIAJCIS.2014.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/QiuHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/RenL14,
  author       = {Si{-}Wei Ren and
                  Ke{-}Wei Lu},
  title        = {Bit Security for Lucas-Based One-Way Function},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {111--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.9},
  doi          = {10.1109/ASIAJCIS.2014.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/RenL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/RuanL14,
  author       = {He{-}Ming Ruan and
                  Chin{-}Laung Lei},
  title        = {Fine-Grained Audit Privilege Control for Integrity Audit on Cloud
                  Storage},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {156--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.28},
  doi          = {10.1109/ASIAJCIS.2014.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/RuanL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangFKHS14,
  author       = {Can Wang and
                  Yaokai Feng and
                  Junpei Kawamoto and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {A Parameterless Learning Algorithm for Behavior-Based Detection},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {11--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.29},
  doi          = {10.1109/ASIAJCIS.2014.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangFKHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangX14,
  author       = {Yufeng Wang and
                  Jing Xu},
  title        = {Overview on Privacy-Preserving Profile-Matching Mechanisms in Mobile
                  Social Networks in Proximity {(MSNP)}},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {133--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.18},
  doi          = {10.1109/ASIAJCIS.2014.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YuanHGQ14,
  author       = {Yuheng Yuan and
                  Zhenzhong He and
                  Zheng Gong and
                  Weidong Qiu},
  title        = {Acceleration of {AES} Encryption with OpenCL},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {64--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.19},
  doi          = {10.1109/ASIAJCIS.2014.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YuanHGQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Zhou14,
  author       = {Caixue Zhou},
  title        = {Provably Secure and Efficient Multi-receiver Identity-Based Generalized
                  Signcryption Scheme},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {82--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.10},
  doi          = {10.1109/ASIAJCIS.2014.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Zhou14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2014,
  title        = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7001440/proceeding},
  isbn         = {978-1-4799-5733-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics