AsiaCCS A

61 papers

YearTitle / Authors
20138th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013
Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng
2013A group signature scheme with unbounded message-dependent opening.
Kazuma Ohara, Yusuke Sakai, Keita Emura, Goichiro Hanaoka
2013An efficient and probabilistic secure bit-decomposition.
Bharath K. Samanthula, Hu Chun, Wei Jiang
2013An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?
Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell
2013An information-flow type-system for mixed protocol secure computation.
Florian Kerschbaum
2013Anonymous attribute-based encryption supporting efficient decryption test.
Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li
2013AppInk: watermarking android apps for repackaging deterrence.
Wu Zhou, Xinwen Zhang, Xuxian Jiang
2013Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Kan Yang, Xiaohua Jia, Kui Ren
2013Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng
2013Blank digital signatures.
Christian Hanser, Daniel Slamanig
2013Boolean symmetric searchable encryption.
Tarik Moataz, Abdullatif Shikfa
2013Comparative study of multicast authentication schemes with application to wide-area measurement system.
Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami
2013Covert computation: hiding code in code for obfuscation purposes.
Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl
2013Data-oblivious graph algorithms for secure computation and outsourcing.
Marina Blanton, Aaron Steele, Mehrdad Aliasgari
2013Defining verifiability in e-auction protocols.
Jannik Dreier, Hugo Jonker, Pascal Lafourcade
2013Designing leakage-resilient password entry on touchscreen mobile devices.
Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng
2013DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie
2013DroidChameleon: evaluating Android anti-malware against transformation attacks.
Vaibhav Rastogi, Yan Chen, Xuxian Jiang
2013Dynamix: anonymity on dynamic social structures.
Abedelaziz Mohaisen, Yongdae Kim
2013Efficient dynamic provable possession of remote data via balanced update trees.
Yihua Zhang, Marina Blanton
2013Efficient user-space information flow control.
Ben Niu, Gang Tan
2013Enforcing system-wide control flow integrity for exploit detection and diagnosis.
Aravind Prakash, Heng Yin, Zhenkai Liang
2013Expressive search on encrypted data.
Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen
2013Faster secure two-party computation with less memory.
Wilko Henecka, Thomas Schneider
2013Fuzzing the ActionScript virtual machine.
Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang
2013Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi
2013Horizon extender: long-term preservation of data leakage evidence in web traffic.
David Gugelmann, Dominik Schatzmann, Vincent Lenders
2013LogicScope: automatic discovery of logic vulnerabilities within web applications.
Xiaowei Li, Yuan Xue
2013Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection.
Davide Maiorca, Igino Corona, Giorgio Giacinto
2013Multi-channel broadcast encryption.
Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
2013Multi-key leakage-resilient threshold cryptography.
Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He
2013On the effectiveness of API-level access control using bytecode rewriting in Android.
Hao Hao, Vicky Singh, Wenliang Du
2013On the feasibility of inference attacks by third-party extensions to social network systems.
Seyed Hossein Ahmadinejad, Philip W. L. Fong
2013PSiOS: bring your own privacy & security to iOS devices.
Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
2013Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
2013Practical verification of WPA-TKIP vulnerabilities.
Mathy Vanhoef, Frank Piessens
2013Privacy settings in social networking systems: what you cannot control.
Amirreza Masoumzadeh, James Joshi
2013Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li
2013Privacy-preserving smart metering with regional statistics and personal enquiry services.
Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou
2013Proof of plaintext knowledge for code-based public-key encryption revisited.
Rong Hu, Kirill Morozov, Tsuyoshi Takagi
2013Protecting access privacy of cached contents in information centric networks.
Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim
2013Protecting function pointers in binary.
Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres
2013Protecting privacy by sanitizing personal data: a new approach to anonymous credentials.
Sébastien Canard, Roch Lescuyer
2013Pseudorandom signatures.
Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering
2013Robust network traffic identification with unknown applications.
Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou
2013STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig
2013SecLaaS: secure logging-as-a-service for cloud forensics.
Shams Zawoad, Amit Kumar Dutta, Ragib Hasan
2013Secure cloud-assisted location based reminder.
Xinxin Zhao, Lingjun Li, Guoliang Xue
2013Sensing-enabled channels for hard-to-detect command and control of mobile devices.
Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart
2013SocialWatch: detection of online service abuse via large-scale social graphs.
Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao
2013TabShots: client-side detection of tabnabbing attacks.
Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen
2013The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities.
Viet Hung Nguyen, Fabio Massacci
2013The role and effectiveness of cryptography in network virtualization: a position paper.
Wenbo Mao
2013Time evolving graphical password for securing mobile devices.
Zhan Wang, Jiwu Jing, Liang Li
2013Towards asymmetric searchable encryption with message recovery and flexible search authorization.
Qiang Tang, Xiaofeng Chen
2013Towards fully incremental cryptographic schemes.
Kevin Atighehchi, Traian Muntean
2013Towards preventing QR code based attacks on android phone using security warnings.
Huiping Yao, Dongwan Shin
2013Trustworthy distributed computing on social networks.
Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim
2013Verifiable and private top-k monitoring.
Xuhua Ding, HweeHwa Pang, Junzuo Lai
2013Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.
Jia Xu, Ee-Chien Chang, Jianying Zhou
2013Your love is public now: questioning the use of personal information in authentication.
Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao