ICICS C

30 papers

YearTitle / Authors
2013A Covert Channel Using Event Channel State on Xen Hypervisor.
Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu
2013A Secure and Efficient Scheme for Cloud Storage against Eavesdropper.
Jian Liu, Huimei Wang, Ming Xian, Kun Huang
2013Accelerating AES in JavaScript with WebGL.
Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen
2013Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited.
Wenhao Wang, Dongdai Lin
2013Attacking and Fixing the CS Mode.
Han Sui, Wenling Wu, Liting Zhang, Peng Wang
2013Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure.
Amir Moradi, Oliver Mischke
2013Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext.
Y. Sreenivasa Rao, Ratna Dutta
2013Defeat Information Leakage from Browser Extensions via Data Obfuscation.
Wentao Chang, Songqing Chen
2013Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters.
Chee Meng Tey, Debin Gao
2013Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks.
Smitha Sundareswaran, Anna Cinzia Squicciarini
2013Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou
2013EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods.
Mingliang Feng, Yongbin Zhou, Zhenmei Yu
2013Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim
2013Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model.
Zheng Yang
2013Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels.
Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing
2013Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One.
Zhi Hu, Lin Wang, Maozhi Xu, Guoliang Zhang
2013Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
Sihan Qing, Jianying Zhou, Dongmei Liu
2013Integral Attacks on Reduced-Round PRESENT.
Shengbao Wu, Mingsheng Wang
2013OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks.
Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang, Huipeng Fang
2013PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks.
Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis
2013Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure.
Huiling Qian, Jiguo Li, Yichen Zhang
2013Rating Web Pages Using Page-Transition Evidence.
Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang
2013Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators.
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
2013Secure and Private Outsourcing of Shape-Based Feature Extraction.
Shumiao Wang, Mohamed Nassar, Mikhail J. Atallah, Qutaibah M. Malluhi
2013Threshold Secret Image Sharing.
Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren
2013Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures.
Hong Rong, Ming Xian, Huimei Wang, Jiangyong Shi
2013Toward Generic Method for Server-Aided Cryptography.
Sébastien Canard, Iwen Coisel, Julien Devigne, Cécilia Gallais, Thomas Peters, Olivier Sanders
2013Type-Based Analysis of Protected Storage in the TPM.
Jianxiong Shao, Dengguo Feng, Yu Qin
2013VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OS.
Zhenjiang Qian, Hao Huang, Fangmin Song
2013XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation.
Eunjung Yoon, Peng Liu