default search action
Search dblp for Publications
export results for "toc:db/conf/atis/atis2017.bht:"
@inproceedings{DBLP:conf/atis/AbbasS17, author = {Muhamed Fauzi Bin Abbas and Thambipillai Srikanthan}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Low-Complexity Signature-Based Malware Detection for IoT Devices}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {181--189}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_15}, doi = {10.1007/978-981-10-5421-1\_15}, timestamp = {Mon, 26 Jun 2023 20:45:03 +0200}, biburl = {https://dblp.org/rec/conf/atis/AbbasS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/AmanSAS17, author = {Naqqash Aman and Yasir Saleem and Fahim H. Abbasi and Farrukh Shahzad}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {A Hybrid Approach for Malware Family Classification}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {169--180}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_14}, doi = {10.1007/978-981-10-5421-1\_14}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/AmanSAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/BazaiJZ17, author = {Sibghat Ullah Bazai and Julian Jang{-}Jaccard and Xuyun Zhang}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {A Privacy Preserving Platform for MapReduce}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {88--99}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_8}, doi = {10.1007/978-981-10-5421-1\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/BazaiJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/GauravaramHS17, author = {Praveen Gauravaram and Shoichi Hirose and Douglas Stebila}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Security Analysis of a Design Variant of Randomized Hashing}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {14--22}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_2}, doi = {10.1007/978-981-10-5421-1\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/GauravaramHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/KakarlaMSC17, author = {Sourya Kakarla and Srinath Mandava and Dhiman Saha and Dipanwita Roy Chowdhury}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round {AES}}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {58--72}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_6}, doi = {10.1007/978-981-10-5421-1\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/KakarlaMSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/KedzioraCS17, author = {Michal Kedziora and Yang{-}Wai Chow and Willy Susilo}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {3--13}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_1}, doi = {10.1007/978-981-10-5421-1\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/KedzioraCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/KoieITM17, author = {Takeru Koie and Takanori Isobe and Yosuke Todo and Masakatu Morii}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Low-Data Complexity Attacks on Camellia}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {128--140}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_11}, doi = {10.1007/978-981-10-5421-1\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/KoieITM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/LeemaqzLM17, author = {Kaleb L. Leemaqz and Sharon X. Lee and Geoffrey J. McLachlan}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Private Distributed Three-Party Learning of Gaussian Mixture Models}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {75--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_7}, doi = {10.1007/978-981-10-5421-1\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/LeemaqzLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/Otterstad17, author = {Christian Otterstad}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {On the Effectiveness of Non-readable Executable Memory Against {BROP}}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {214--221}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_18}, doi = {10.1007/978-981-10-5421-1\_18}, timestamp = {Fri, 23 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/Otterstad17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/PhongA0WM17, author = {Le Trieu Phong and Yoshinori Aono and Takuya Hayashi and Lihua Wang and Shiho Moriai}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Privacy-Preserving Deep Learning: Revisited and Enhanced}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {100--110}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_9}, doi = {10.1007/978-981-10-5421-1\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/PhongA0WM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/QinL17, author = {Wenjie Qin and Kewei Lv}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {48--57}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_5}, doi = {10.1007/978-981-10-5421-1\_5}, timestamp = {Fri, 23 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/QinL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/SelviPR17, author = {S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {An Efficient Non-transferable Proxy Re-encryption Scheme}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {35--47}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_4}, doi = {10.1007/978-981-10-5421-1\_4}, timestamp = {Fri, 23 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/SelviPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/SunLAWM17, author = {Bo Sun and Xiapu Luo and Mitsuaki Akiyama and Takuya Watanabe and Tatsuya Mori}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Characterizing Promotional Attacks in Mobile App Store}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {113--127}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_10}, doi = {10.1007/978-981-10-5421-1\_10}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/SunLAWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/TianWZSL17, author = {Xiang Tian and Yu Wang and Yujia Zhu and Yong Sun and Qingyun Liu}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {De-anonymous and Anonymous Technologies for Network Traffic Release}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {193--200}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_16}, doi = {10.1007/978-981-10-5421-1\_16}, timestamp = {Fri, 23 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/TianWZSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/YalameFS17, author = {Mohammad Hossein Yalame and Mohammad Hossein Farzam and Siavash Bayat Sarmadi}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {23--34}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_3}, doi = {10.1007/978-981-10-5421-1\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/YalameFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/Yarygina17, author = {Tetiana Yarygina}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {RESTful Is Not Secure}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {141--153}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_12}, doi = {10.1007/978-981-10-5421-1\_12}, timestamp = {Fri, 23 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/Yarygina17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/YooB17, author = {Sang Guun Yoo and Jhonattan J. Barriga}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {201--213}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_17}, doi = {10.1007/978-981-10-5421-1\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/YooB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/ZhangYPS17, author = {Ruibin Zhang and Chi Yang and Shaoning Pang and Hossein Sarrafzadeh}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {157--168}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_13}, doi = {10.1007/978-981-10-5421-1\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/ZhangYPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atis/2017, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1}, doi = {10.1007/978-981-10-5421-1}, isbn = {978-981-10-5420-4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.