Search dblp for Publications

export results for "toc:db/conf/asiajcis/asiajcis2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/asiajcis/FanTEH18,
  author       = {Chun{-}I Fan and
                  Yi{-}Fan Tseng and
                  Cheng{-}Yuan E and
                  Jheng{-}Jia Huang},
  title        = {Transformation between Attribute-Based Encryption and Key-Aggregate
                  Cryptosystem},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {35--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00015},
  doi          = {10.1109/ASIAJCIS.2018.00015},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanTEH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FujimotoMM18,
  author       = {Mariko Fujimoto and
                  Wataru Matsuda and
                  Takuho Mitsunaga},
  title        = {Protecting Struts 2 from {OGNL} Related Attacks by Using Servlet Filter},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {8--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00011},
  doi          = {10.1109/ASIAJCIS.2018.00011},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FujimotoMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GeXLSSW18,
  author       = {Jing Ge and
                  Yifan Xu and
                  Ruiqian Liu and
                  Enze Si and
                  Ning Shang and
                  An Wang},
  title        = {Power Attack and Protected Implementation on Lightweight Block Cipher
                  {SKINNY}},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00020},
  doi          = {10.1109/ASIAJCIS.2018.00020},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GeXLSSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ImaiK18,
  author       = {Hironori Imai and
                  Akira Kanaoka},
  title        = {Time Series Analysis of Copy-and-Paste Impact on Android Application
                  Security},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {15--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00012},
  doi          = {10.1109/ASIAJCIS.2018.00012},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ImaiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/IsawaBTYI18,
  author       = {Ryoichi Isawa and
                  Tao Ban and
                  Ying Tie and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  title        = {Evaluating Disassembly-Code Based Similarity between IoT Malware Samples},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {89--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00023},
  doi          = {10.1109/ASIAJCIS.2018.00023},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/IsawaBTYI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimKY18,
  author       = {Ji Hye Kim and
                  Mee Yeon Kim and
                  Heung Youl Youm},
  title        = {Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication
                  Methods for the Financial Sector},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {62--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00019},
  doi          = {10.1109/ASIAJCIS.2018.00019},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KimKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuzunoIM18,
  author       = {Hiroki Kuzuno and
                  Shun Inagaki and
                  Kenichi Magata},
  title        = {Constructing a Complete Timeline of a Security Incident by Aggregating
                  Reports},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {109--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00026},
  doi          = {10.1109/ASIAJCIS.2018.00026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuzunoIM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KwonSCLP18,
  author       = {Taewoong Kwon and
                  Jungsuk Song and
                  Sangsu Choi and
                  Yunsoo Lee and
                  Jinhak Park},
  title        = {{VISNU:} {A} Novel Visualization Methodology of Security Events Optimized
                  for a Centralized {SOC}},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00010},
  doi          = {10.1109/ASIAJCIS.2018.00010},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KwonSCLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiaoZYR18,
  author       = {Yaqing Liao and
                  Jing Zhou and
                  Yang Yang and
                  Ou Ruan},
  title        = {An Efficient Oblivious Transfer Protocol with Access Control},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {29--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00014},
  doi          = {10.1109/ASIAJCIS.2018.00014},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiaoZYR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MidorikawaTK18,
  author       = {Tatsuya Midorikawa and
                  Akihiro Tachikawa and
                  Akira Kanaoka},
  title        = {Helping Johnny to Search: Encrypted Search on Webmail System},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {47--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00017},
  doi          = {10.1109/ASIAJCIS.2018.00017},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MidorikawaTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/OnoM18,
  author       = {Hibiki Ono and
                  Yoshifumi Manabe},
  title        = {Efficient Card-Based Cryptographic Protocols for the Millionaires'
                  Problem Using Private Input Operations},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {23--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00013},
  doi          = {10.1109/ASIAJCIS.2018.00013},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/OnoM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ShigemotoFKKNFK18,
  author       = {Tomohiro Shigemoto and
                  Shota Fujii and
                  Ichiro Kuriama and
                  Tetsuro Kito and
                  Hirofumi Nakakoji and
                  Yasuhiro Fujii and
                  Hiroaki Kikuchi},
  title        = {Development of White List Based Autonomous Evolution of Defense System
                  for {RAT} Malware},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {95--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00024},
  doi          = {10.1109/ASIAJCIS.2018.00024},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ShigemotoFKKNFK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TianM18,
  author       = {Junfeng Tian and
                  Yanwei Ma},
  title        = {Load Balancing Method Based on a Performance and Power Ratio},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {75--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00021},
  doi          = {10.1109/ASIAJCIS.2018.00021},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TianM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TianXC18,
  author       = {Junfeng Tian and
                  Lizheng Xue and
                  Hongyun Cai},
  title        = {An Algorithm Based on Influence to Predict Invisible Relationship},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {54--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00018},
  doi          = {10.1109/ASIAJCIS.2018.00018},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TianXC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsudaNTINT18,
  author       = {Yu Tsuda and
                  Junji Nakazato and
                  Yaichiro Takagi and
                  Daisuke Inoue and
                  Koji Nakao and
                  Kenjiro Terada},
  title        = {A Lightweight Host-Based Intrusion Detection Based on Process Generation
                  Patterns},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {102--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00025},
  doi          = {10.1109/ASIAJCIS.2018.00025},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsudaNTINT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangXWR18,
  author       = {Jingyuan Wang and
                  Peidai Xie and
                  Yongjun Wang and
                  Zelin Rong},
  title        = {A Survey of Return-Oriented Programming Attack, Defense and Its Benign
                  Use},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {83--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00022},
  doi          = {10.1109/ASIAJCIS.2018.00022},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangXWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/XuCY18,
  author       = {Ming Xu and
                  Yu Cheng and
                  QiXin Yin},
  title        = {Toward a Resilient System: The Inspiration from Information Security
                  Management Appliance},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {42--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00016},
  doi          = {10.1109/ASIAJCIS.2018.00016},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/XuCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2018,
  title        = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8453224/proceeding},
  isbn         = {978-1-5386-7380-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics