- Satomi Saito, Satoru Torii, Katsunari Yoshioka, Tsutomu Matsumoto:
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots. AsiaJCIS 2016: 60-66 - Koji Shima, Hiroshi Doi:
({1, 3}, n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants. AsiaJCIS 2016: 108-114 - Bilhanan Silverajan, Markku Vajaranta, Antti Kolehmainen:
Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers. AsiaJCIS 2016: 9-16 - Bayu Adhi Tama, Kyung Hyune Rhee:
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network. AsiaJCIS 2016: 87-91 - Markku Vajaranta, Joona Kannisto, Jarmo Harju:
Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlays. AsiaJCIS 2016: 17-23 - Thomas Vannet, Noboru Kunihiro:
Partial Server Side Parameter Selection in Private Information Retrieval. AsiaJCIS 2016: 31-38 - Chih-Hung Wang, Chien-Ming Wang:
Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment. AsiaJCIS 2016: 130-135 - Yuhei Watanabe, Yosuke Todo, Masakatu Morii:
New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1. AsiaJCIS 2016: 115-123 - Jia-Rung Yeh, Hsu-Chun Hsiao, Ai-Chun Pang:
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes. AsiaJCIS 2016: 92-99 - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-2285-4 [contents]
- 2015
- Takashi Adachi, Kazumasa Omote:
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode. AsiaJCIS 2015: 145-151 - Jonghyun Baek, Heung Youl Youm:
Secure and Lightweight Authentication Protocol for NFC Tag Based Services. AsiaJCIS 2015: 63-68 - Chin-Chen Chang, Iuon-Chang Lin, Yi-Lun Chi:
Secure Electronic Coupons. AsiaJCIS 2015: 104-109 - Chia-Mei Chen, Tien-Ho Chang:
The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method. AsiaJCIS 2015: 37-41 - Hung-Yu Chien:
De-synchronization Attack on Quadratic Residues-Based RFID Ownership Transfer. AsiaJCIS 2015: 42-47 - Chun-I Fan, Shi-Yuan Huang, Wen-Che Hsu:
Encrypted Data Deduplication in Cloud Storage. AsiaJCIS 2015: 18-25 - Chun-I Fan, Chien-Nan Wu, Chun-Hung Chen, Yi-Fan Tseng, Cheng-Chun Feng:
Attribute-Based Proxy Re-encryption with Dynamic Membership. AsiaJCIS 2015: 26-32 - Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding. AsiaJCIS 2015: 152-159 - Chih-Hung Hsieh, Yu-Siang Shen, Chao-Wen Li, Jain-Shing Wu:
iF2: An Interpretable Fuzzy Rule Filter for Web Log Post-Compromised Malicious Activity Monitoring. AsiaJCIS 2015: 130-137 - Chien-Lung Hsu, Tzu-Wei Lin:
Privacy-Preserved Key Agreement with User Authentication. AsiaJCIS 2015: 12-17 - Chen-Ming Hsu, Jen-Chun Lee, Wei-Kuei Chen:
An Efficient Detection Algorithm for Copy-Move Forgery. AsiaJCIS 2015: 33-36 - Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments. AsiaJCIS 2015: 91-96 - Naoto Kawaguchi, Kazumasa Omote:
Malware Function Classification Using APIs in Initial Behavior. AsiaJCIS 2015: 138-144 - Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga:
Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals. AsiaJCIS 2015: 85-90 - Hakju Kim, Kwangjo Kim:
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function. AsiaJCIS 2015: 110-111 - Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Constructions of Fail-Stop Signatures for Multi-signer Setting. AsiaJCIS 2015: 112-123 - Tomoaki Kosugi, Tomoki Hayafuji, Masahiro Mambo:
On the Traceability of the Accountable Anonymous Channel. AsiaJCIS 2015: 6-11 - Wen-Chung Kuo, Hong-Ji Wei, Yu-Hui Chen, Jiin-Chiou Cheng:
An Enhanced Secure Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments. AsiaJCIS 2015: 1-5 - Yu Liu, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation. AsiaJCIS 2015: 77-84 - Nai-Wei Lo, Meng-Chih Chiang, Chao Yang Hsu:
Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks. AsiaJCIS 2015: 55-62