


default search action
Search dblp for Publications
export results for "toc:db/conf/ispec/ispec2018.bht:"
@inproceedings{DBLP:conf/ispec/0001DMAFKS18, author = {Partha Sarathi Roy and Sabyasachi Dutta and Kirill Morozov and Avishek Adhikari and Kazuhide Fukushima and Shinsaku Kiyomoto and Kouichi Sakurai}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {578--594}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_37}, doi = {10.1007/978-3-319-99807-7\_37}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/0001DMAFKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/0005ZMYT18, author = {Weiwei Liu and Yinghui Zhang and Yi Mu and Guomin Yang and Yangguang Tian}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Efficient Traceable Oblivious Transfer and Its Applications}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {610--621}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_39}, doi = {10.1007/978-3-319-99807-7\_39}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/0005ZMYT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CarpovS18, author = {Sergiu Carpov and Oana Stan}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {265--281}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_16}, doi = {10.1007/978-3-319-99807-7\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CarpovS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChengC18, author = {Zhaohui Cheng and Liqun Chen}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Certificateless Public Key Signature Schemes from Standard Algorithms}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {179--197}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_11}, doi = {10.1007/978-3-319-99807-7\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ChengC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChiuYN18, author = {Wayne Chiu and Kuo{-}Hui Yeh and Akihito Nakamura}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Seeing Is Believing: Authenticating Users with What They See and Remember}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {391--403}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_24}, doi = {10.1007/978-3-319-99807-7\_24}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ChiuYN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Datta18, author = {Pratish Datta}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Constrained (Verifiable) Pseudorandom Function from Functional Encryption}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {141--159}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_9}, doi = {10.1007/978-3-319-99807-7\_9}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Datta18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/DuttaNR18, author = {Sabyasachi Dutta and Nishant Nikam and Sushmita Ruj}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to {SVM}}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {533--543}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_34}, doi = {10.1007/978-3-319-99807-7\_34}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/DuttaNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GabillonB18, author = {Alban Gabillon and Emmanuel Bruno}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Regulating IoT Messages}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {468--480}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_29}, doi = {10.1007/978-3-319-99807-7\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GabillonB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GuoWZC18, author = {Jingjing Guo and Jianfeng Wang and Zhiwei Zhang and Xiaofeng Chen}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {An Almost Non-interactive Order Preserving Encryption Scheme}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {87--100}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_6}, doi = {10.1007/978-3-319-99807-7\_6}, timestamp = {Tue, 18 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GuoWZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HiranoKK18, author = {Takato Hirano and Yutaka Kawai and Yoshihiro Koseki}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {160--175}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_10}, doi = {10.1007/978-3-319-99807-7\_10}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HiranoKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HiroseS18, author = {Shoichi Hirose and Junji Shikata}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Non-adaptive Group-Testing Aggregate {MAC} Scheme}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {357--372}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_22}, doi = {10.1007/978-3-319-99807-7\_22}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/HiroseS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KomanoXKS18, author = {Yuichi Komano and Zhengfan Xia and Takeshi Kawabata and Hideo Shimizu}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {455--467}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_28}, doi = {10.1007/978-3-319-99807-7\_28}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KomanoXKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LandauerWSSF18, author = {Max Landauer and Markus Wurzenberger and Florian Skopik and Giuseppe Settanni and Peter Filzmoser}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {19--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_2}, doi = {10.1007/978-3-319-99807-7\_2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LandauerWSSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiMWHL18, author = {Wenjuan Li and Weizhi Meng and Yu Wang and Jinguang Han and Jin Li}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {313--328}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_19}, doi = {10.1007/978-3-319-99807-7\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiMWHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuWWXX18, author = {Yi{-}Ning Liu and Yan{-}Ping Wang and Xiao{-}Fen Wang and Zhe Xia and Jingfang Xu}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {506--518}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_32}, doi = {10.1007/978-3-319-99807-7\_32}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LiuWWXX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LohHT18, author = {Jia{-}Ch'ng Loh and Swee{-}Huay Heng and Syh{-}Yuan Tan}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {A Generic Framework for Accountable Optimistic Fair Exchange Protocol}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {299--309}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_18}, doi = {10.1007/978-3-319-99807-7\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LohHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LuoWL18, author = {Fucai Luo and Kunpeng Wang and Changlu Lin}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {101--115}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_7}, doi = {10.1007/978-3-319-99807-7\_7}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LuoWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LuoWTZHG18, author = {Entao Luo and Guojun Wang and Kun Tang and Quanyou Zhao and Chen He and Liyong Guo}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {495--505}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_31}, doi = {10.1007/978-3-319-99807-7\_31}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LuoWTZHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MengL18, author = {Weizhi Meng and Zhe Liu}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {373--390}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_23}, doi = {10.1007/978-3-319-99807-7\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/MengL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MiuraMT18, author = {Hiroya Miura and Mamoru Mimura and Hidema Tanaka}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Macros Finder: Do You Remember LOVELETTER?}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {3--18}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_1}, doi = {10.1007/978-3-319-99807-7\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/MiuraMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PereraK18, author = {Maharage Nisansala Sevwandi Perera and Takeshi Koshiba}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {229--247}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_14}, doi = {10.1007/978-3-319-99807-7\_14}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/PereraK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/RenZSLY18, author = {Hao Ren and Peng Zhang and Qingchun Shentu and Joseph K. Liu and Tsz Hon Yuen}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Compact Ring Signature in the Standard Model for Blockchain}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {50--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_4}, doi = {10.1007/978-3-319-99807-7\_4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/RenZSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SameerN18, author = {Venkata Udaya Sameer and Ruchira Naskar}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Universal Wavelet Relative Distortion: {A} New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {37--49}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_3}, doi = {10.1007/978-3-319-99807-7\_3}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SameerN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SantosoYO18, author = {Bagus Santoso and Taiyo Yamaguchi and Tomoyuki Ohkubo}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Entanglement Between Hash Encodings and Signatures from {ID} Schemes with Non-binary Challenges: {A} Case Study on Lightweight Code-Based Signatures}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {248--262}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_15}, doi = {10.1007/978-3-319-99807-7\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/SantosoYO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SchabhuserB018, author = {Lucas Schabh{\"{u}}ser and Denis Butin and Johannes Buchmann}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {{CHQS:} Publicly Verifiable Homomorphic Signatures Beyond the Linear Case}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {213--228}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_13}, doi = {10.1007/978-3-319-99807-7\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/SchabhuserB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SenguptaR18, author = {Binanda Sengupta and Sushmita Ruj}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Keyword-Based Delegable Proofs of Storage}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {282--298}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_17}, doi = {10.1007/978-3-319-99807-7\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/SenguptaR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SimCMYCH18, author = {Bo{-}Yeon Sim and Kyu Young Choi and Dukjae Moon and Hyo Jin Yoon and Jihoon Cho and Dong{-}Guk Han}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {T{\_}SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {407--423}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_25}, doi = {10.1007/978-3-319-99807-7\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SimCMYCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Sumongkayothin18, author = {Karin Sumongkayothin}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {{M-ORAM} Revisited: Security and Construction Updates}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {521--532}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_33}, doi = {10.1007/978-3-319-99807-7\_33}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Sumongkayothin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SuzukiEO18, author = {Tatsuya Suzuki and Keita Emura and Toshihiro Ohigashi}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {A Generic Construction of Integrated Secure-Channel Free {PEKS} and {PKE}}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {69--86}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_5}, doi = {10.1007/978-3-319-99807-7\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SuzukiEO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TekliBIKH18, author = {Jimmy Tekli and Bechara al Bouna and Youssef Bou Issa and Marc Kamradt and Ramzi A. Haraty}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {(k, l)-Clustering for Transactional Data Streams Anonymization}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {544--556}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_35}, doi = {10.1007/978-3-319-99807-7\_35}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/TekliBIKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TianLZLYY18, author = {Yangguang Tian and Yingjiu Li and Yinghui Zhang and Nan Li and Guomin Yang and Yong Yu}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {{DSH:} Deniable Secret Handshake Framework}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {341--353}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_21}, doi = {10.1007/978-3-319-99807-7\_21}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TianLZLYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangCLH18, author = {Huige Wang and Kefei Chen and Joseph K. Liu and Ziyuan Hu}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {119--140}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_8}, doi = {10.1007/978-3-319-99807-7\_8}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangCLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangW18, author = {Yuntao Wang and Thomas Wunderer}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Revisiting the Sparsification Technique in Kannan's Embedding Attack on {LWE}}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {440--452}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_27}, doi = {10.1007/978-3-319-99807-7\_27}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WangW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XiaYZM18, author = {Zhe Xia and Bo Yang and Mingwu Zhang and Yi Mu}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {An Efficient and Provably Secure Private Polynomial Evaluation Scheme}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {595--609}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_38}, doi = {10.1007/978-3-319-99807-7\_38}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/XiaYZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuZXZJ18, author = {Jing Xu and Yuqiang Zhang and Fei Xu and Lei Zhou and Shuanglin Jiang}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {481--492}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_30}, doi = {10.1007/978-3-319-99807-7\_30}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuZXZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YinWLZJ18, author = {Wei Yin and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {A New Insight - Proxy Re-encryption Under {LWE} with Strong Anti-collusion}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {559--577}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_36}, doi = {10.1007/978-3-319-99807-7\_36}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YinWLZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YuanLSSW18, author = {Zhiwei Yuan and Yang Li and Kazuo Sakiyama and Takeshi Sugawara and Jian Wang}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Recovering Memory Access Sequence with Differential Flush+Reload Attack}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {424--439}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_26}, doi = {10.1007/978-3-319-99807-7\_26}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/YuanLSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhengYWSH18, author = {Mingmei Zheng and Shao{-}Jun Yang and Wei Wu and Jun Shao and Xinyi Huang}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {A New Design of Online/Offline Signatures Based on Lattice}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {198--212}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_12}, doi = {10.1007/978-3-319-99807-7\_12}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhengYWSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZongCS18, author = {Wei Zong and Yang{-}Wai Chow and Willy Susilo}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {A Two-Stage Classifier Approach for Network Intrusion Detection}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {329--340}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_20}, doi = {10.1007/978-3-319-99807-7\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZongCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2018, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7}, doi = {10.1007/978-3-319-99807-7}, isbn = {978-3-319-99806-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.