ICICS C

40 papers

YearTitle / Authors
2009A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper].
Gunmeet Singh, Sarbjeet Singh
2009A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold.
Zhengmin Xia, Songnian Lu, Jianhua Li, Aixin Zhang
2009A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach.
Mitra Fatemi, Taraneh Eghlidos, Mohammad Reza Aref
2009A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate.
Yi-Ruei Chen, Wen-Guey Tzeng
2009A User Trust-Based Collaborative Filtering Recommendation Algorithm.
Fuzhi Zhang, Long Bai, Feng Gao
2009A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing.
Wenbo Mao
2009Adaptive and Composable Oblivious Transfer Protocols (Short Paper).
Huafei Zhu, Feng Bao
2009An Image Sanitizing Scheme Using Digital Watermarking.
Masatoshi Noguchi, Manabu Inuma, Rie Shigetomi, Hideki Imai
2009Architecture- and OS-Independent Binary-Level Dynamic Test Generation.
Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang
2009Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence.
Tomas Olsson
2009Biometric-Based Non-transferable Anonymous Credentials.
Marina Blanton, William M. P. Hudelson
2009Bring Efficient Connotation Expressible Policies to Trust Management.
Yan Zhang, Zhengde Zhai, Dengguo Feng
2009Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining.
Xin-Jing Ge, Jianming Zhu
2009Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao
2009Denial-of-Service Attacks on Host-Based Generic Unpackers.
Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia
2009Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes.
Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Joshi
2009Deterministic Finite Automata Characterization for Memory-Based Pattern Matching.
Lucas Vespa, Ning Weng
2009Digital Audio Watermarking Technique Using Pseudo-Zernike Moments.
Xiangyang Wang, Tianxiao Ma, Panpan Niu
2009Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang
2009Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng
2009Fingerprinting Attack on the Tor Anonymity System.
Yi Shi, Kanta Matsuura
2009GUC-Secure Join Operator in Distributed Relational Database.
Yuan Tian, Hao Zhang
2009Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.
Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger
2009How to Steal a Botnet and What Can Happen When You Do.
Richard A. Kemmerer
2009Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
Sihan Qing, Chris J. Mitchell, Guilin Wang
2009IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.
Ping Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie
2009Measuring Information Flow in Reactive Processes.
Chunyan Mu
2009Online/Offline Ring Signature Scheme.
Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
2009Policy-Controlled Signatures.
Pairat Thorncharoensri, Willy Susilo, Yi Mu
2009Predictive Pattern Matching for Scalable Network Intrusion Detection.
Lucas Vespa, Mini Mathew, Ning Weng
2009Proactive Verifiable Linear Integer Secret Sharing Scheme.
Chuangui Ma, Xiaofei Ding
2009Public Key Encryption without Random Oracle Made Truly Practical.
Puwen Wei, Xiaoyun Wang, Yuliang Zheng
2009Secure Remote Execution of Sequential Computations.
Ghassan Karame, Mario Strasser, Srdjan Capkun
2009Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher.
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
2009Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform.
Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura, Yuichi Komano, Kazuo Ohta
2009TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics.
Guangquan Xu, Zhiyong Feng, Xiaohong Li, Hutong Wu, Yongxin Yu, Shizhan Chen, Guozheng Rao
2009The rakaposhi Stream Cipher.
Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara
2009Trusted Isolation Environment: An Attestation Architecture with Usage Control Model.
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang, Zhong Chen
2009User-Assisted Host-Based Detection of Outbound Malware Traffic.
Huijun Xiong, Prateek Malhotra, Deian Stefan, Chehai Wu, Danfeng Yao
2009Using the (Open) Solaris Service Management Facility as a Building Block for System Security.
Christoph L. Schuba