default search action
Search dblp for Publications
export results for "toc:db/conf/ispec/ispec2016.bht:"
@inproceedings{DBLP:conf/ispec/AdachiO16, author = {Daichi Adachi and Kazumasa Omote}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {A Host-Based Detection Method of Remote Access Trojan in the Early Stage}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {110--121}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_8}, doi = {10.1007/978-3-319-49151-6\_8}, timestamp = {Wed, 21 Aug 2024 07:35:24 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AdachiO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BarralFGJN16, author = {Hadrien Barral and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Georges{-}Axel Jaloyan and David Naccache}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {ARMv8 Shellcodes from 'A' to 'Z'}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {354--377}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_25}, doi = {10.1007/978-3-319-49151-6\_25}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/BarralFGJN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BiL16, author = {Jingguo Bi and Jiayang Liu}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {37--47}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_3}, doi = {10.1007/978-3-319-49151-6\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/BiL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BlaskiewiczKS16, author = {Przemyslaw Blaskiewicz and Lukasz Krzywiecki and Piotr Syga}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {{RFID} Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {209--223}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_15}, doi = {10.1007/978-3-319-49151-6\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/BlaskiewiczKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChenCW16, author = {Zhan Chen and Huaifeng Chen and Xiaoyun Wang}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Cryptanalysis of Midori128 Using Impossible Differential Techniques}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {1--12}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_1}, doi = {10.1007/978-3-319-49151-6\_1}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ChenCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CoglianiFGN16, author = {Simon Cogliani and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {344--353}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_24}, doi = {10.1007/978-3-319-49151-6\_24}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/CoglianiFGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JinSRJ16, author = {Yaoan Jin and Chunhua Su and Na Ruan and Weijia Jia}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {300--314}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_21}, doi = {10.1007/978-3-319-49151-6\_21}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/JinSRJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KluczniakHK16, author = {Kamil Kluczniak and Lucjan Hanzlik and Miroslaw Kutylowski}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {A Formal Concept of Domain Pseudonymous Signatures}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {238--254}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_17}, doi = {10.1007/978-3-319-49151-6\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KluczniakHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KoppBK16, author = {Henning Kopp and Christoph B{\"{o}}sch and Frank Kargl}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {KopperCoin - {A} Distributed File Storage with Financial Incentives}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {79--93}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_6}, doi = {10.1007/978-3-319-49151-6\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KoppBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MaYZ16, author = {Zhoujun Ma and Li Yang and Yunlei Zhao}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Practical Signature Scheme from {\textbackslash}varGamma {\(\Gamma\)} -Protocol}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {94--109}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_7}, doi = {10.1007/978-3-319-49151-6\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/MaYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PanBLL16, author = {Wenlun Pan and Zhenzhen Bao and Dongdai Lin and Feng Liu}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {The Distribution of 2n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {13--36}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_2}, doi = {10.1007/978-3-319-49151-6\_2}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PanBLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PengTCWZ16, author = {Zhiniang Peng and Shaohua Tang and Ju Chen and Chen Wu and Xinglin Zhang}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 {CPU}}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {151--166}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_11}, doi = {10.1007/978-3-319-49151-6\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PengTCWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/RajabHAC16, author = {Adel Rajab and Chin{-}Tser Huang and Mohammed Al{-}Shargabi and Jorge Arturo Cobb}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {315--329}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_22}, doi = {10.1007/978-3-319-49151-6\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/RajabHAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SiewTL16, author = {Hong Wei Siew and Saw Chin Tan and Ching Kwang Lee}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {137--150}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_10}, doi = {10.1007/978-3-319-49151-6\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SiewTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangLZZ16, author = {Hongbing Wang and Yingjiu Li and Zongyang Zhang and Yunlei Zhao}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Efficient Tag Path Authentication Protocol with Less Tag Memory}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {255--270}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_18}, doi = {10.1007/978-3-319-49151-6\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangLZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WeiYL16, author = {Zhuo Wei and Yanjiang Yang and Tieyan Li}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Authenticated {CAN} Communications Using Standardized Cryptographic Techniques}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {330--343}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_23}, doi = {10.1007/978-3-319-49151-6\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WeiYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WijayaLSSH16, author = {Dimaz Ankaa Wijaya and Joseph K. Liu and Ron Steinfeld and Shifeng Sun and Xinyi Huang}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Anonymizing Bitcoin Transaction}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {271--283}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_19}, doi = {10.1007/978-3-319-49151-6\_19}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WijayaLSSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuMSG16, author = {Ge Wu and Yi Mu and Willy Susilo and Fuchun Guo}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Privacy-Preserving Cloud Auditing with Multiple Uploaders}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {224--237}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_16}, doi = {10.1007/978-3-319-49151-6\_16}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WuMSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuCWF16, author = {Chen Xu and Jingwei Chen and Wenyuan Wu and Yong Feng}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Homomorphically Encrypted Arithmetic Operations Over the Integer Ring}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {167--181}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_12}, doi = {10.1007/978-3-319-49151-6\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuCWF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YaoMY16, author = {Zhongyuan Yao and Yi Mu and Guomin Yang}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {A Privacy Preserving Source Verifiable Encryption Scheme}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {182--193}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_13}, doi = {10.1007/978-3-319-49151-6\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/YaoMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangW16, author = {Huiling Zhang and Wenling Wu}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Structural Evaluation for Simon-Like Designs Against Integral Attack}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {194--208}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_14}, doi = {10.1007/978-3-319-49151-6\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangWZ16, author = {Jian Zhang and Wenling Wu and Yafei Zheng}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Security of {SM4} Against (Related-Key) Differential Cryptanalysis}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {65--78}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_5}, doi = {10.1007/978-3-319-49151-6\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangWZ16a, author = {Jian Zhang and Wenling Wu and Yafei Zheng}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Collision Attacks on {CAESAR} Second-Round Candidate: ELmD}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {122--136}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_9}, doi = {10.1007/978-3-319-49151-6\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangWZ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangXJJ16, author = {Guozhu Zhang and Luning Xia and Shijie Jia and Yafei Ji}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Physical-Layer Identification of {HF} {RFID} Cards Based on {RF} Fingerprinting}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {284--299}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_20}, doi = {10.1007/978-3-319-49151-6\_20}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangXJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangZLH16, author = {Jian Zhang and Yawei Zhang and Pin Liu and Jianbiao He}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {A Spark-Based DDoS Attack Detection Model in Cloud Services}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {48--64}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_4}, doi = {10.1007/978-3-319-49151-6\_4}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangZLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2016, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6}, doi = {10.1007/978-3-319-49151-6}, isbn = {978-3-319-49150-9}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.