default search action
Search dblp for Publications
export results for "toc:db/conf/fcs2/fcs2018.bht:"
@inproceedings{DBLP:conf/fcs2/Chow18, author = {Sherman S. M. Chow}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Privacy-Preserving Machine Learning}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {3--6}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_1}, doi = {10.1007/978-981-13-3095-7\_1}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/Chow18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/DongWZ18, author = {Lihua Dong and Jie Wang and Shuo Zhang}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Novel Analysis of Stream Cipher Combing {LFSR} and {FCSR}}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {23--38}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_3}, doi = {10.1007/978-981-13-3095-7\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/DongWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/HanLF18, author = {Yanyan Han and Guohao Li and Binbin Feng}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {An SDN-Based Wireless Authentication and Access Control Security Solution}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {179--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_14}, doi = {10.1007/978-981-13-3095-7\_14}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/HanLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/HarunaHEKT18, author = {Charles R. Haruna and Mengshu Hou and Moses Jojo Eghan and Michael Y. Kpiebaareh and Lawrence Tandoh}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {A Hybrid Data Deduplication Approach in Entity Resolution Using Chromatic Correlation Clustering}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {153--167}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_12}, doi = {10.1007/978-981-13-3095-7\_12}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/HarunaHEKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/HouJGS18, author = {Jinqiu Hou and Mingming Jiang and Yuyan Guo and Wangan Song}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {110--118}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_9}, doi = {10.1007/978-981-13-3095-7\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/HouJGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/JinCYZ18, author = {Chunhua Jin and Guanhua Chen and Changhui Yu and Jianyang Zhao}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Heterogeneous Deniable Authentication for E-Voting Systems}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {41--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_4}, doi = {10.1007/978-981-13-3095-7\_4}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fcs2/JinCYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/JinYXGHYLZ18, author = {Rui Jin and Yidong Yuan and Ruishan Xin and Jie Gan and Xiaobo Hu and Yanyan Yu and Na Li and Yiqiang Zhao}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Active Shield Design for Security Chip in Smart Grid}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {273--281}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_21}, doi = {10.1007/978-981-13-3095-7\_21}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/JinYXGHYLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/LiFW18, author = {Lin Li and Mingyu Fan and Guangwei Wang}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {{LWSQR:} Lightweight Secure {QR} Code}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {241--255}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_19}, doi = {10.1007/978-981-13-3095-7\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/LiFW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/LiZ18, author = {Zhaoqi Li and Yuyang Zhou}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {190--198}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_15}, doi = {10.1007/978-981-13-3095-7\_15}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/LiZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/LiangZS18, author = {Pengfei Liang and Leyou Zhang and Yujie Shang}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {66--80}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_6}, doi = {10.1007/978-981-13-3095-7\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fcs2/LiangZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/MaT0Z18, author = {Hua Ma and Guohua Tian and Zhenhua Liu and Linchao Zhang}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {168--176}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_13}, doi = {10.1007/978-981-13-3095-7\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/MaT0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/Neupane18, author = {Kashi Neupane}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {One-Round Authenticated Group Key Establishment Using Multilinear Maps}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {55--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_5}, doi = {10.1007/978-981-13-3095-7\_5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/Neupane18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/WangGYL18, author = {Danni Wang and Juntao Gao and Haiyong Yu and Xuelian Li}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {A Novel Digital Rights Management in {P2P} Networks Based on Bitcoin System}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {227--240}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_18}, doi = {10.1007/978-981-13-3095-7\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/WangGYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/WangH18, author = {Zilong Wang and Honggang Hu}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Efficient KEA-Style Lattice-Based Authenticated Key Exchange}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {96--109}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_8}, doi = {10.1007/978-981-13-3095-7\_8}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fcs2/WangH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/WangHDYZ018, author = {Yong Wang and Abdelrhman Hassan and Xiaoran Duan and Xiaodong Yang and Yiquan Zhang and Xiaosong Zhang}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {An Authentication Approach for Multiple-User Location-Based Queries}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {256--270}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_20}, doi = {10.1007/978-981-13-3095-7\_20}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/WangHDYZ018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/WangYHD18, author = {Xiaofei Wang and Longcheng Yang and Jun Hu and Hao Dai}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {A Violent Behavior Detection Algorithm Combining Streakline Model with Variational Model}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {216--224}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_17}, doi = {10.1007/978-981-13-3095-7\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/WangYHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/WangZL0Z18, author = {Juan Wang and Haoxi Zhang and Fei Li and Zuli Wang and Jun Zhao}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Intelligent Vehicle Knowledge Representation and Anomaly Detection Using Neural Knowledge {DNA}}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {201--215}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_16}, doi = {10.1007/978-981-13-3095-7\_16}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/WangZL0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/WuX18, author = {Chenhuang Wu and Chunxiang Xu}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {On k-error Linear Complexity of Zeng-Cai-Tang-Yang Generalized Cyclotomic Binary Sequences of Period p\({}^{\mbox{2}}\)}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {9--22}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_2}, doi = {10.1007/978-981-13-3095-7\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/WuX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/YangZ18, author = {Ning Yang and Yueyu Zhang}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {A Radio Frequency Fingerprint Extraction Method Based on Cluster Center Difference}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {282--298}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_22}, doi = {10.1007/978-981-13-3095-7\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/YangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/ZhangGJL18, author = {Peng Zhang and Juntao Gao and Wenjuan Jia and Xuelian Li}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {138--152}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_11}, doi = {10.1007/978-981-13-3095-7\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/ZhangGJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/ZhangGYJJ18, author = {Yanhua Zhang and Yong Gan and Yifeng Yin and Huiwen Jia and Mingming Jiang}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Efficient Lattice {FIBS} for Identities in a Small Universe}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {83--95}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_7}, doi = {10.1007/978-981-13-3095-7\_7}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/ZhangGYJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/ZhaoXC18, author = {Jining Zhao and Chunxiang Xu and Kefei Chen}, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy}, booktitle = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, pages = {121--137}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7\_10}, doi = {10.1007/978-981-13-3095-7\_10}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/ZhaoXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fcs2/2018, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7}, doi = {10.1007/978-981-13-3095-7}, isbn = {978-981-13-3094-0}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.