Search dblp for Publications

export results for "toc:db/conf/ispec/ispec2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ispec/AdachiO16,
  author       = {Daichi Adachi and
                  Kazumasa Omote},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {A Host-Based Detection Method of Remote Access Trojan in the Early
                  Stage},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {110--121},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_8},
  doi          = {10.1007/978-3-319-49151-6\_8},
  timestamp    = {Wed, 21 Aug 2024 07:35:24 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/AdachiO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BarralFGJN16,
  author       = {Hadrien Barral and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Georges{-}Axel Jaloyan and
                  David Naccache},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {ARMv8 Shellcodes from 'A' to 'Z'},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {354--377},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_25},
  doi          = {10.1007/978-3-319-49151-6\_25},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/BarralFGJN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BiL16,
  author       = {Jingguo Bi and
                  Jiayang Liu},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Cryptanalysis of a Privacy Preserving Auditing for Data Integrity
                  Protocol from TrustCom 2013},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {37--47},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_3},
  doi          = {10.1007/978-3-319-49151-6\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/BiL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BlaskiewiczKS16,
  author       = {Przemyslaw Blaskiewicz and
                  Lukasz Krzywiecki and
                  Piotr Syga},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {{RFID} Tags Batch Authentication Revisited - Communication Overhead
                  and Server Computational Complexity Limits},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {209--223},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_15},
  doi          = {10.1007/978-3-319-49151-6\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/BlaskiewiczKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChenCW16,
  author       = {Zhan Chen and
                  Huaifeng Chen and
                  Xiaoyun Wang},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Cryptanalysis of Midori128 Using Impossible Differential Techniques},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {1--12},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_1},
  doi          = {10.1007/978-3-319-49151-6\_1},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ChenCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CoglianiFGN16,
  author       = {Simon Cogliani and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {344--353},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_24},
  doi          = {10.1007/978-3-319-49151-6\_24},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/CoglianiFGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JinSRJ16,
  author       = {Yaoan Jin and
                  Chunhua Su and
                  Na Ruan and
                  Weijia Jia},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Privacy-Preserving Mining of Association Rules for Horizontally Distributed
                  Databases Based on FP-Tree},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {300--314},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_21},
  doi          = {10.1007/978-3-319-49151-6\_21},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/JinSRJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KluczniakHK16,
  author       = {Kamil Kluczniak and
                  Lucjan Hanzlik and
                  Miroslaw Kutylowski},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {A Formal Concept of Domain Pseudonymous Signatures},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {238--254},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_17},
  doi          = {10.1007/978-3-319-49151-6\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KluczniakHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KoppBK16,
  author       = {Henning Kopp and
                  Christoph B{\"{o}}sch and
                  Frank Kargl},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {KopperCoin - {A} Distributed File Storage with Financial Incentives},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {79--93},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_6},
  doi          = {10.1007/978-3-319-49151-6\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KoppBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MaYZ16,
  author       = {Zhoujun Ma and
                  Li Yang and
                  Yunlei Zhao},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Practical Signature Scheme from {\textbackslash}varGamma {\(\Gamma\)}
                  -Protocol},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {94--109},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_7},
  doi          = {10.1007/978-3-319-49151-6\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/MaYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PanBLL16,
  author       = {Wenlun Pan and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Feng Liu},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {The Distribution of 2n 2 n -Periodic Binary Sequences with Fixed k-Error
                  Linear Complexity},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {13--36},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_2},
  doi          = {10.1007/978-3-319-49151-6\_2},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PanBLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PengTCWZ16,
  author       = {Zhiniang Peng and
                  Shaohua Tang and
                  Ju Chen and
                  Chen Wu and
                  Xinglin Zhang},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Fast Implementation of Simple Matrix Encryption Scheme on Modern x64
                  {CPU}},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {151--166},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_11},
  doi          = {10.1007/978-3-319-49151-6\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PengTCWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/RajabHAC16,
  author       = {Adel Rajab and
                  Chin{-}Tser Huang and
                  Mohammed Al{-}Shargabi and
                  Jorge Arturo Cobb},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Countering Burst Header Packet Flooding Attack in Optical Burst Switching
                  Network},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {315--329},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_22},
  doi          = {10.1007/978-3-319-49151-6\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/RajabHAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SiewTL16,
  author       = {Hong Wei Siew and
                  Saw Chin Tan and
                  Ching Kwang Lee},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Masking Algorithm for Multiple Crosstalk Attack Source Identification
                  Under Greedy Sparse Monitoring},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {137--150},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_10},
  doi          = {10.1007/978-3-319-49151-6\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SiewTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangLZZ16,
  author       = {Hongbing Wang and
                  Yingjiu Li and
                  Zongyang Zhang and
                  Yunlei Zhao},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Efficient Tag Path Authentication Protocol with Less Tag Memory},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {255--270},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_18},
  doi          = {10.1007/978-3-319-49151-6\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangLZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WeiYL16,
  author       = {Zhuo Wei and
                  Yanjiang Yang and
                  Tieyan Li},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Authenticated {CAN} Communications Using Standardized Cryptographic
                  Techniques},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {330--343},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_23},
  doi          = {10.1007/978-3-319-49151-6\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WeiYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WijayaLSSH16,
  author       = {Dimaz Ankaa Wijaya and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Shifeng Sun and
                  Xinyi Huang},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Anonymizing Bitcoin Transaction},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {271--283},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_19},
  doi          = {10.1007/978-3-319-49151-6\_19},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WijayaLSSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WuMSG16,
  author       = {Ge Wu and
                  Yi Mu and
                  Willy Susilo and
                  Fuchun Guo},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Privacy-Preserving Cloud Auditing with Multiple Uploaders},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {224--237},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_16},
  doi          = {10.1007/978-3-319-49151-6\_16},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WuMSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuCWF16,
  author       = {Chen Xu and
                  Jingwei Chen and
                  Wenyuan Wu and
                  Yong Feng},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Homomorphically Encrypted Arithmetic Operations Over the Integer Ring},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {167--181},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_12},
  doi          = {10.1007/978-3-319-49151-6\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuCWF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YaoMY16,
  author       = {Zhongyuan Yao and
                  Yi Mu and
                  Guomin Yang},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {A Privacy Preserving Source Verifiable Encryption Scheme},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {182--193},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_13},
  doi          = {10.1007/978-3-319-49151-6\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/YaoMY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangW16,
  author       = {Huiling Zhang and
                  Wenling Wu},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Structural Evaluation for Simon-Like Designs Against Integral Attack},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {194--208},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_14},
  doi          = {10.1007/978-3-319-49151-6\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangWZ16,
  author       = {Jian Zhang and
                  Wenling Wu and
                  Yafei Zheng},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Security of {SM4} Against (Related-Key) Differential Cryptanalysis},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {65--78},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_5},
  doi          = {10.1007/978-3-319-49151-6\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangWZ16a,
  author       = {Jian Zhang and
                  Wenling Wu and
                  Yafei Zheng},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Collision Attacks on {CAESAR} Second-Round Candidate: ELmD},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {122--136},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_9},
  doi          = {10.1007/978-3-319-49151-6\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangWZ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangXJJ16,
  author       = {Guozhu Zhang and
                  Luning Xia and
                  Shijie Jia and
                  Yafei Ji},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Physical-Layer Identification of {HF} {RFID} Cards Based on {RF} Fingerprinting},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {284--299},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_20},
  doi          = {10.1007/978-3-319-49151-6\_20},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangXJJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangZLH16,
  author       = {Jian Zhang and
                  Yawei Zhang and
                  Pin Liu and
                  Jianbiao He},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {A Spark-Based DDoS Attack Detection Model in Cloud Services},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {48--64},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_4},
  doi          = {10.1007/978-3-319-49151-6\_4},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangZLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2016,
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6},
  doi          = {10.1007/978-3-319-49151-6},
  isbn         = {978-3-319-49150-9},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}