| 2016 | Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu |
| 2015 | A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences. Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu, Zhenyu Chen |
| 2015 | A Multivariate Encryption Scheme with Rainbow. Takanori Yasuda, Kouichi Sakurai |
| 2015 | A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal. Xuejie Ding, Meng Zhang, Jun Shi, Wei-qing Huang |
| 2015 | A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility. Hongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song |
| 2015 | A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System. Chuiyi Xie, Ying Huo, Sihan Qing, Shoushan Luo, Lingli Hu |
| 2015 | A Solution of Code Authentication on Android. Xue Zhang, Rui Zhang |
| 2015 | An Entropy Based Encrypted Traffic Classifier. Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova |
| 2015 | An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks. Degang Sun, Kun Yang, Wei-qing Huang, Yan Wang, Bo Hu |
| 2015 | An ORAM Scheme with Improved Worst-Case Computational Overhead. Nairen Cao, Xiaoqi Yu, Yufang Yang, Linru Zhang, Siu-Ming Yiu |
| 2015 | Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. Zhenzhen Bao, Peng Luo, Dongdai Lin |
| 2015 | Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication. Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia |
| 2015 | Characterization of the Third Descent Points for the k-error Linear Complexity of 2^n 2 n -periodic Binary Sequences. Jianqin Zhou, Wanquan Liu, Xifeng Wang |
| 2015 | Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism. Wenjun Fan, Zhihui Du, David Fernández, Xinning Hui |
| 2015 | Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan |
| 2015 | Efficient and Secure Many-to-One Signature Delegation. Rajeev Anand Sahu, Vishal Saraswat |
| 2015 | Ensuring Kernel Integrity Using KIPBMFH. Zhifeng Chen, Qingbao Li, Songhui Guo, Ye Wang |
| 2015 | Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups. Jie Zhang, Aijun Ge, Siyu Xiao, Chuangui Ma |
| 2015 | Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity. Shoichi Hirose |
| 2015 | Higher-Order Masking Schemes for Simon. Jiehui Tang, Yongbin Zhou, Hailong Zhang, Shuang Qiu |
| 2015 | How to Vote Privately Using Bitcoin. Zhichao Zhao, T.-H. Hubert Chan |
| 2015 | Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System. Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi |
| 2015 | MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage. Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li |
| 2015 | Minimizing Databases Attack Surface Against SQL Injection Attacks. Dimitris Geneiatakis |
| 2015 | Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach. Qian Zhang, Ying Jiang, Liping Ding |
| 2015 | Multi-input Functional Encryption and Its Application in Outsourcing Computation. Peili Li, Haixia Xu, Yuanyuan Ji |
| 2015 | Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s. Hong Xu, Ping Jia, Geshi Huang, Xuejia Lai |
| 2015 | On Promise Problem of the Generalized Shortest Vector Problem. Wenwen Wang, Kewei Lv |
| 2015 | Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm. Weiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han, Xiaoguang Zheng |
| 2015 | Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks. Paolo Palmieri |
| 2015 | Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers Accuracy. Viktor Monarev, Andrey Pestunov |
| 2015 | QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu |
| 2015 | Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa Channel. Xuanxuan Wang, Lihuan Jiang, Lars Thiele, Yongming Wang |
| 2015 | Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang |
| 2015 | Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks. Depeng Chen, Daojing He, Sammy Chan |
| 2015 | Strategy of Relations Collection in Factoring RSA Modulus. Haibo Yu, Guoqiang Bai |
| 2015 | Suffix Type String Matching Algorithms Based on Multi-windows and Integer Comparison. Hongbo Fan, Shupeng Shi, Jing Zhang, Li Dong |
| 2015 | TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. Bo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng |
| 2015 | The Security of Polynomial Information of Diffie-Hellman Key. Yao Wang, Kewei Lv |
| 2015 | Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable. Zhen Liu, Duncan S. Wong |
| 2015 | Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance. Dan Zhang, Guoqiang Bai |
| 2015 | Verifiable Proxy Re-encryption from Indistinguishability Obfuscation. Muhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo |