Search dblp for Publications

export results for "toc:db/conf/atis/atis2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/atis/AbbasS17,
  author       = {Muhamed Fauzi Bin Abbas and
                  Thambipillai Srikanthan},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Low-Complexity Signature-Based Malware Detection for IoT Devices},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {181--189},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_15},
  doi          = {10.1007/978-981-10-5421-1\_15},
  timestamp    = {Mon, 26 Jun 2023 20:45:03 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/AbbasS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/AmanSAS17,
  author       = {Naqqash Aman and
                  Yasir Saleem and
                  Fahim H. Abbasi and
                  Farrukh Shahzad},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {A Hybrid Approach for Malware Family Classification},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {169--180},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_14},
  doi          = {10.1007/978-981-10-5421-1\_14},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/AmanSAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/BazaiJZ17,
  author       = {Sibghat Ullah Bazai and
                  Julian Jang{-}Jaccard and
                  Xuyun Zhang},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {A Privacy Preserving Platform for MapReduce},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {88--99},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_8},
  doi          = {10.1007/978-981-10-5421-1\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/BazaiJZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/GauravaramHS17,
  author       = {Praveen Gauravaram and
                  Shoichi Hirose and
                  Douglas Stebila},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Security Analysis of a Design Variant of Randomized Hashing},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {14--22},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_2},
  doi          = {10.1007/978-981-10-5421-1\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/GauravaramHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/KakarlaMSC17,
  author       = {Sourya Kakarla and
                  Srinath Mandava and
                  Dhiman Saha and
                  Dipanwita Roy Chowdhury},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {On the Practical Implementation of Impossible Differential Cryptanalysis
                  on Reduced-Round {AES}},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_6},
  doi          = {10.1007/978-981-10-5421-1\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/KakarlaMSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/KedzioraCS17,
  author       = {Michal Kedziora and
                  Yang{-}Wai Chow and
                  Willy Susilo},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_1},
  doi          = {10.1007/978-981-10-5421-1\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/KedzioraCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/KoieITM17,
  author       = {Takeru Koie and
                  Takanori Isobe and
                  Yosuke Todo and
                  Masakatu Morii},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Low-Data Complexity Attacks on Camellia},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_11},
  doi          = {10.1007/978-981-10-5421-1\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/KoieITM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/LeemaqzLM17,
  author       = {Kaleb L. Leemaqz and
                  Sharon X. Lee and
                  Geoffrey J. McLachlan},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Private Distributed Three-Party Learning of Gaussian Mixture Models},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {75--87},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_7},
  doi          = {10.1007/978-981-10-5421-1\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/LeemaqzLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/Otterstad17,
  author       = {Christian Otterstad},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {On the Effectiveness of Non-readable Executable Memory Against {BROP}},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {214--221},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_18},
  doi          = {10.1007/978-981-10-5421-1\_18},
  timestamp    = {Fri, 23 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/Otterstad17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/PhongA0WM17,
  author       = {Le Trieu Phong and
                  Yoshinori Aono and
                  Takuya Hayashi and
                  Lihua Wang and
                  Shiho Moriai},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Privacy-Preserving Deep Learning: Revisited and Enhanced},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {100--110},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_9},
  doi          = {10.1007/978-981-10-5421-1\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/PhongA0WM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/QinL17,
  author       = {Wenjie Qin and
                  Kewei Lv},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Rounding Technique's Application in Schnorr Signature Algorithm: Known
                  Partially Most Significant Bits of Nonce},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {48--57},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_5},
  doi          = {10.1007/978-981-10-5421-1\_5},
  timestamp    = {Fri, 23 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/QinL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/SelviPR17,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  C. Pandu Rangan},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {An Efficient Non-transferable Proxy Re-encryption Scheme},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_4},
  doi          = {10.1007/978-981-10-5421-1\_4},
  timestamp    = {Fri, 23 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/SelviPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/SunLAWM17,
  author       = {Bo Sun and
                  Xiapu Luo and
                  Mitsuaki Akiyama and
                  Takuya Watanabe and
                  Tatsuya Mori},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Characterizing Promotional Attacks in Mobile App Store},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_10},
  doi          = {10.1007/978-981-10-5421-1\_10},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/SunLAWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/TianWZSL17,
  author       = {Xiang Tian and
                  Yu Wang and
                  Yujia Zhu and
                  Yong Sun and
                  Qingyun Liu},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {De-anonymous and Anonymous Technologies for Network Traffic Release},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {193--200},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_16},
  doi          = {10.1007/978-981-10-5421-1\_16},
  timestamp    = {Fri, 23 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/TianWZSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/YalameFS17,
  author       = {Mohammad Hossein Yalame and
                  Mohammad Hossein Farzam and
                  Siavash Bayat Sarmadi},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Secure Two-Party Computation Using an Efficient Garbled Circuit by
                  Reducing Data Transfer},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {23--34},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_3},
  doi          = {10.1007/978-981-10-5421-1\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/YalameFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/Yarygina17,
  author       = {Tetiana Yarygina},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {RESTful Is Not Secure},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {141--153},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_12},
  doi          = {10.1007/978-981-10-5421-1\_12},
  timestamp    = {Fri, 23 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/Yarygina17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/YooB17,
  author       = {Sang Guun Yoo and
                  Jhonattan J. Barriga},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {201--213},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_17},
  doi          = {10.1007/978-981-10-5421-1\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atis/YooB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/ZhangYPS17,
  author       = {Ruibin Zhang and
                  Chi Yang and
                  Shaoning Pang and
                  Hossein Sarrafzadeh},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification
                  in Darknet Space},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {157--168},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_13},
  doi          = {10.1007/978-981-10-5421-1\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/ZhangYPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atis/2017,
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1},
  doi          = {10.1007/978-981-10-5421-1},
  isbn         = {978-981-10-5420-4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}