default search action
6. ATIS 2016: Cairns, QLD, Australia
- Lynn Batten, Gang Li:
Applications and Techniques in Information Security - 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings. Communications in Computer and Information Science 651, 2016, ISBN 978-981-10-2740-6
Attacks on Data Security Systems
- Lynn Margaret Batten, Mohammed Khalil Amain:
A New Sign-Change Attack on the Montgomery Ladders. 3-14 - Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. 15-26
Detection of Attacks on Data Security Systems
- Xi Zheng, Lei Pan, Hongxu Chen, Peiyin Wang:
Investigating Security Vulnerabilities in Modern Vehicle Systems. 29-40 - Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. 41-53 - Abdullahi Chowdhury:
Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview. 54-65
Data Security
- Maciej Skórski:
Evaluating Entropy Sources for True Random Number Generators by Collision Counting. 69-80 - James Jin Kang, Tom H. Luan, Henry Larkin:
Enhancement of Sensor Data Transmission by Inference and Efficient Data Processing. 81-92 - Srinivasa Rao Subramanya Rao:
An Improved EllipticNet Algorithm for Tate Pairing on Weierstrass' Curves, Faster Point Arithmetic and Pairing on Selmer Curves and a Note on Double Scalar Multiplication. 93-105 - Pinaki Sarkar, Morshed Uddin Chowdhury:
Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi). 106-114
Data Privacy
- Veronika Kuchta, Olivier Markowitch:
Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption. 117-129 - Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun:
Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space. 130-141 - Yufeng Lin, Biplob Ray, Dennis Jarvis, Jia Wang:
False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks. 142-153 - Swathi Parasa, Lynn Margaret Batten:
Mobile Money in the Australasian Region - A Technical Security Perspective. 154-162
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.