ICICS C

50 papers

YearTitle / Authors
2012A Comparative Study of Malware Family Classification.
Md. Rafiqul Islam, Irfan Altas
2012A Fine-Grained Classification Approach for the Packed Malicious Code.
Shanqing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, Tao Ban
2012A Generic Approach for Providing Revocation Support in Secret Handshake.
Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou
2012A Key Sharing Fuzzy Vault Scheme.
Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, Fenghai Li
2012A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin
2012A New Version of McEliece PKC Based on Convolutional Codes.
Carl Löndahl, Thomas Johansson
2012A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains.
Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen
2012Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.
Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu
2012An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.
Anjia Yang, Yunhui Zhuang, Duncan S. Wong
2012Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.
Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, Dongdai Lin
2012Audio Steganalysis Based on Lossless Data-Compression Techniques.
Fatiha Djebbar, Beghdad Ayad
2012Comparison between Side-Channel Analysis Distinguishers.
Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger
2012Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu-Ming Yiu, Sihan Qing
2012Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain.
Wilko Henecka, Nigel G. Bean, Matthew Roughan
2012Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.
Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, Chunguang Ma
2012Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
2012Countermeasures on Application Level Low-Rate Denial-of-Service Attack.
Yajuan Tang
2012Cryptanalysis of Multi-Prime RSA with Small Prime Difference.
Hatem M. Bahig, Ashraf Bhery, Dieaa I. Nassr
2012Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis.
Ruoxu Zhao, Dawu Gu, Juanru Li, Hui Liu
2012Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer.
Ting Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang
2012Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography.
Yan Zhang, Dengguo Feng
2012Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding.
Daewon Kim, Byoung-Koo Kim, Ikkyun Kim, Jeongnyeo Kim, Hyunsook Cho
2012Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.
Yang-Wai Chow, Willy Susilo, Duncan S. Wong
2012Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme.
Yuxin Meng, Wenjuan Li
2012Exploring Mobile Proxies for Better Password Authentication.
Nitesh Saxena, Jonathan Voris
2012F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances.
Huimin Shuai, Wen Tao Zhu
2012Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test.
Zouheir Trabelsi, Liren Zhang, Safaa Zeidan
2012Flexible Attribute-Based Encryption.
Seiko Arita
2012Forward Secure Attribute-Based Signatures.
Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou
2012Group Behavior Metrics for P2P Botnet Detection.
John Felix Charles Joseph, Ali A. Ghorbani
2012Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.
Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu
2012Impact of the Revocation Service in PKI Prices.
Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins
2012Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.
Jun Xu, Lei Hu, Siwei Sun
2012Improved Related-Key Differential Attacks on Reduced-Round LBlock.
Shusheng Liu, Zheng Gong, Libin Wang
2012Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
Tat Wing Chim, Tsz Hon Yuen
2012Location Privacy Policy Management System.
Arej Muhammed, Dan Lin, Anna Cinzia Squicciarini
2012Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles.
Yanli Ren, Shuozhong Wang, Xinpeng Zhang
2012On Constant-Round Precise Zero-Knowledge.
Ning Ding, Dawu Gu
2012On Security of Universal Hash Function Based Multiple Authentication.
Aysajan Abidin
2012Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen
2012Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance.
Yan Cao, Qiang Wei, Qingxian Wang
2012Perfect Ambiguous Optimistic Fair Exchange.
Yang Wang, Man Ho Au, Willy Susilo
2012Permission-Based Abnormal Application Detection for Android.
Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen
2012Privacy Protection in Social Networks Using l-Diversity.
Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen
2012Privacy-Preserving Noisy Keyword Search in Cloud Computing.
Xiaoqiong Pang, Bo Yang, Qiong Huang
2012Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition.
Yong Liu, Meishan Huang, Bogang Lin
2012Security Enhancement of Identity-Based Identification with Reversibility.
Atsushi Fujioka, Taiichi Saito, Keita Xagawa
2012Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.
Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, Kwun Yin Yu
2012Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data.
Vrizlynn L. L. Thing, Darell J. J. Tan
2012Taint Analysis of Security Code in the KLEE Symbolic Execution Engine.
Ricardo Corin, Felipe Andrés Manzano