Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/asiajcis/asiajcis2018.bht:"
@inproceedings{DBLP:conf/asiajcis/FanTEH18, author = {Chun{-}I Fan and Yi{-}Fan Tseng and Cheng{-}Yuan E and Jheng{-}Jia Huang}, title = {Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {35--41}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00015}, doi = {10.1109/ASIAJCIS.2018.00015}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FanTEH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FujimotoMM18, author = {Mariko Fujimoto and Wataru Matsuda and Takuho Mitsunaga}, title = {Protecting Struts 2 from {OGNL} Related Attacks by Using Servlet Filter}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {8--14}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00011}, doi = {10.1109/ASIAJCIS.2018.00011}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FujimotoMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/GeXLSSW18, author = {Jing Ge and Yifan Xu and Ruiqian Liu and Enze Si and Ning Shang and An Wang}, title = {Power Attack and Protected Implementation on Lightweight Block Cipher {SKINNY}}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00020}, doi = {10.1109/ASIAJCIS.2018.00020}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/GeXLSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ImaiK18, author = {Hironori Imai and Akira Kanaoka}, title = {Time Series Analysis of Copy-and-Paste Impact on Android Application Security}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {15--22}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00012}, doi = {10.1109/ASIAJCIS.2018.00012}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ImaiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/IsawaBTYI18, author = {Ryoichi Isawa and Tao Ban and Ying Tie and Katsunari Yoshioka and Daisuke Inoue}, title = {Evaluating Disassembly-Code Based Similarity between IoT Malware Samples}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {89--94}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00023}, doi = {10.1109/ASIAJCIS.2018.00023}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/IsawaBTYI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KimKY18, author = {Ji Hye Kim and Mee Yeon Kim and Heung Youl Youm}, title = {Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial Sector}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {62--68}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00019}, doi = {10.1109/ASIAJCIS.2018.00019}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KimKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuzunoIM18, author = {Hiroki Kuzuno and Shun Inagaki and Kenichi Magata}, title = {Constructing a Complete Timeline of a Security Incident by Aggregating Reports}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {109--115}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00026}, doi = {10.1109/ASIAJCIS.2018.00026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuzunoIM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KwonSCLP18, author = {Taewoong Kwon and Jungsuk Song and Sangsu Choi and Yunsoo Lee and Jinhak Park}, title = {{VISNU:} {A} Novel Visualization Methodology of Security Events Optimized for a Centralized {SOC}}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00010}, doi = {10.1109/ASIAJCIS.2018.00010}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KwonSCLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiaoZYR18, author = {Yaqing Liao and Jing Zhou and Yang Yang and Ou Ruan}, title = {An Efficient Oblivious Transfer Protocol with Access Control}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {29--34}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00014}, doi = {10.1109/ASIAJCIS.2018.00014}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiaoZYR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MidorikawaTK18, author = {Tatsuya Midorikawa and Akihiro Tachikawa and Akira Kanaoka}, title = {Helping Johnny to Search: Encrypted Search on Webmail System}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {47--53}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00017}, doi = {10.1109/ASIAJCIS.2018.00017}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MidorikawaTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/OnoM18, author = {Hibiki Ono and Yoshifumi Manabe}, title = {Efficient Card-Based Cryptographic Protocols for the Millionaires' Problem Using Private Input Operations}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {23--28}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00013}, doi = {10.1109/ASIAJCIS.2018.00013}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/OnoM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ShigemotoFKKNFK18, author = {Tomohiro Shigemoto and Shota Fujii and Ichiro Kuriama and Tetsuro Kito and Hirofumi Nakakoji and Yasuhiro Fujii and Hiroaki Kikuchi}, title = {Development of White List Based Autonomous Evolution of Defense System for {RAT} Malware}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {95--101}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00024}, doi = {10.1109/ASIAJCIS.2018.00024}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ShigemotoFKKNFK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TianM18, author = {Junfeng Tian and Yanwei Ma}, title = {Load Balancing Method Based on a Performance and Power Ratio}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00021}, doi = {10.1109/ASIAJCIS.2018.00021}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TianM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TianXC18, author = {Junfeng Tian and Lizheng Xue and Hongyun Cai}, title = {An Algorithm Based on Influence to Predict Invisible Relationship}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {54--61}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00018}, doi = {10.1109/ASIAJCIS.2018.00018}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TianXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsudaNTINT18, author = {Yu Tsuda and Junji Nakazato and Yaichiro Takagi and Daisuke Inoue and Koji Nakao and Kenjiro Terada}, title = {A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {102--108}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00025}, doi = {10.1109/ASIAJCIS.2018.00025}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TsudaNTINT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangXWR18, author = {Jingyuan Wang and Peidai Xie and Yongjun Wang and Zelin Rong}, title = {A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {83--88}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00022}, doi = {10.1109/ASIAJCIS.2018.00022}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangXWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/XuCY18, author = {Ming Xu and Yu Cheng and QiXin Yin}, title = {Toward a Resilient System: The Inspiration from Information Security Management Appliance}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {42--46}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00016}, doi = {10.1109/ASIAJCIS.2018.00016}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/XuCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2018, title = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8453224/proceeding}, isbn = {978-1-5386-7380-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.