ICICS C

23 papers

YearTitle / Authors
2015Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
Lucas Chi Kwong Hui, S. H. Qing, Elaine Shi, Siu-Ming Yiu
20144P_VES: A Collusion-Resistant Accountable Virtual Economy System.
Hong Zhang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2014A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter.
Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu
2014A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation.
Peeter Laud
2014A Visual One-Time Password Authentication Scheme Using Mobile Devices.
Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi
2014Attribute Based Key-Insulated Signatures with Message Recovery.
Y. Sreenivasa Rao, Ratna Dutta
2014Distance Lower Bounding.
Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
2014Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework.
Vandana Guleria, Ratna Dutta
2014Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao
2014Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang
2014How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Yingxian Zheng, Yongbin Zhou, Zhenmei Yu, Chengyu Hu, Hailong Zhang
2014MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis.
Asadullah Al Galib, Reihaneh Safavi-Naini
2014Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices.
Qianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng
2014Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation.
Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang
2014New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security.
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2014Privacy-Preserving Distance-Bounding Proof-of-Knowledge.
Ahmad Ahmadi, Reihaneh Safavi-Naini
2014Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks.
Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen
2014Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors.
Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim
2014SEDB: Building Secure Database Services for Sensitive Data.
Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang
2014Secure and Efficient Scheme for Delegation of Signing Rights.
Rajeev Anand Sahu, Vishal Saraswat
2014Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model.
Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu
2014TagDroid: Hybrid SSL Certificate Verification in Android.
Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, Dawu Gu
2014XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra.
Sabyasachi Dutta, Avishek Adhikari