default search action
17. ICICS 2015: Beijing, China
- Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu:
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9543, Springer 2016, ISBN 978-3-319-29813-9 - Dimitris Geneiatakis:
Minimizing Databases Attack Surface Against SQL Injection Attacks. 1-9 - Zhifeng Chen, Qingbao Li, Songhui Guo, Ye Wang:
Ensuring Kernel Integrity Using KIPBMFH. 10-17 - Zhenzhen Bao, Peng Luo, Dongdai Lin:
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. 18-36 - Wenwen Wang, Kewei Lv:
On Promise Problem of the Generalized Shortest Vector Problem. 37-49 - Xuanxuan Wang, Lihuan Jiang, Lars Thiele, Yongming Wang:
Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa Channel. 50-61 - Weiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm. 62-70 - Yao Wang, Kewei Lv:
The Security of Polynomial Information of Diffie-Hellman Key. 71-81 - Zhichao Zhao, T.-H. Hubert Chan:
How to Vote Privately Using Bitcoin. 82-96 - Hong Xu, Ping Jia, Geshi Huang, Xuejia Lai:
Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s. 97-108 - Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable. 109-124 - Shoichi Hirose:
Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity. 125-140 - Xuejie Ding, Meng Zhang, Jun Shi, Wei-qing Huang:
A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal. 141-151 - Bo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. 152-168 - Jianqin Zhou, Wanquan Liu, Xifeng Wang:
Characterization of the Third Descent Points for the k-error Linear Complexity of 2^n 2 n -periodic Binary Sequences. 169-183 - Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu:
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. 184-198 - Haibo Yu, Guoqiang Bai:
Strategy of Relations Collection in Factoring RSA Modulus. 199-211 - Dan Zhang, Guoqiang Bai:
Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance. 212-219 - Peili Li, Haixia Xu, Yuanyuan Ji:
Multi-input Functional Encryption and Its Application in Outsourcing Computation. 220-235 - Takanori Yasuda, Kouichi Sakurai:
A Multivariate Encryption Scheme with Rainbow. 236-251 - Rajeev Anand Sahu, Vishal Saraswat:
Efficient and Secure Many-to-One Signature Delegation. 252-259 - Jie Zhang, Aijun Ge, Siyu Xiao, Chuangui Ma:
Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups. 260-268 - Hongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song:
A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility. 269-281 - Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova:
An Entropy Based Encrypted Traffic Classifier. 282-294 - Qian Zhang, Ying Jiang, Liping Ding:
Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach. 295-302 - Degang Sun, Kun Yang, Wei-qing Huang, Yan Wang, Bo Hu:
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks. 303-310 - Wenjun Fan, Zhihui Du, David Fernández, Xinning Hui:
Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism. 311-319 - Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System. 320-334 - Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li:
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage. 335-345 - Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia:
Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication. 346-355 - Xue Zhang, Rui Zhang:
A Solution of Code Authentication on Android. 356-362 - Muhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo:
Verifiable Proxy Re-encryption from Indistinguishability Obfuscation. 363-378 - Jiehui Tang, Yongbin Zhou, Hailong Zhang, Shuang Qiu:
Higher-Order Masking Schemes for Simon. 379-392 - Nairen Cao, Xiaoqi Yu, Yufang Yang, Linru Zhang, Siu-Ming Yiu:
An ORAM Scheme with Improved Worst-Case Computational Overhead. 393-405 - Chuiyi Xie, Ying Huo, Sihan Qing, Shoushan Luo, Lingli Hu:
A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System. 406-413 - Hongbo Fan, Shupeng Shi, Jing Zhang, Li Dong:
Suffix Type String Matching Algorithms Based on Multi-windows and Integer Comparison. 414-420 - Depeng Chen, Daojing He, Sammy Chan:
Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks. 421-435 - Paolo Palmieri:
Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks. 436-444 - Viktor Monarev, Andrey Pestunov:
Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers Accuracy. 445-457 - Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan:
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. 458-466 - Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang:
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. 467-477 - Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu, Zhenyu Chen:
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences. 478-484
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.