default search action
12th ISPEC 2016: Zhangjiajie, China
- Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 - Zhan Chen, Huaifeng Chen, Xiaoyun Wang:
Cryptanalysis of Midori128 Using Impossible Differential Techniques. 1-12 - Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. 13-36 - Jingguo Bi, Jiayang Liu:
Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013. 37-47 - Jian Zhang, Yawei Zhang, Pin Liu, Jianbiao He:
A Spark-Based DDoS Attack Detection Model in Cloud Services. 48-64 - Jian Zhang, Wenling Wu, Yafei Zheng:
Security of SM4 Against (Related-Key) Differential Cryptanalysis. 65-78 - Henning Kopp, Christoph Bösch, Frank Kargl:
KopperCoin - A Distributed File Storage with Financial Incentives. 79-93 - Zhoujun Ma, Li Yang, Yunlei Zhao:
Practical Signature Scheme from \varGamma Γ -Protocol. 94-109 - Daichi Adachi, Kazumasa Omote:
A Host-Based Detection Method of Remote Access Trojan in the Early Stage. 110-121 - Jian Zhang, Wenling Wu, Yafei Zheng:
Collision Attacks on CAESAR Second-Round Candidate: ELmD. 122-136 - Hong Wei Siew, Saw Chin Tan, Ching Kwang Lee:
Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring. 137-150 - Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang:
Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU. 151-166 - Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng:
Homomorphically Encrypted Arithmetic Operations Over the Integer Ring. 167-181 - Zhongyuan Yao, Yi Mu, Guomin Yang:
A Privacy Preserving Source Verifiable Encryption Scheme. 182-193 - Huiling Zhang, Wenling Wu:
Structural Evaluation for Simon-Like Designs Against Integral Attack. 194-208 - Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Piotr Syga:
RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. 209-223 - Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo:
Privacy-Preserving Cloud Auditing with Multiple Uploaders. 224-237 - Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski:
A Formal Concept of Domain Pseudonymous Signatures. 238-254 - Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. 255-270 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang:
Anonymizing Bitcoin Transaction. 271-283 - Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji:
Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting. 284-299 - Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia:
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree. 300-314 - Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb:
Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network. 315-329 - Zhuo Wei, Yanjiang Yang, Tieyan Li:
Authenticated CAN Communications Using Standardized Cryptographic Techniques. 330-343 - Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache:
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography. 344-353 - Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache:
ARMv8 Shellcodes from 'A' to 'Z'. 354-377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.