ICICS C

42 papers

YearTitle / Authors
2016Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
2015A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences.
Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu, Zhenyu Chen
2015A Multivariate Encryption Scheme with Rainbow.
Takanori Yasuda, Kouichi Sakurai
2015A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal.
Xuejie Ding, Meng Zhang, Jun Shi, Wei-qing Huang
2015A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility.
Hongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song
2015A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System.
Chuiyi Xie, Ying Huo, Sihan Qing, Shoushan Luo, Lingli Hu
2015A Solution of Code Authentication on Android.
Xue Zhang, Rui Zhang
2015An Entropy Based Encrypted Traffic Classifier.
Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova
2015An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks.
Degang Sun, Kun Yang, Wei-qing Huang, Yan Wang, Bo Hu
2015An ORAM Scheme with Improved Worst-Case Computational Overhead.
Nairen Cao, Xiaoqi Yu, Yufang Yang, Linru Zhang, Siu-Ming Yiu
2015Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers.
Zhenzhen Bao, Peng Luo, Dongdai Lin
2015Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication.
Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia
2015Characterization of the Third Descent Points for the k-error Linear Complexity of 2^n 2 n -periodic Binary Sequences.
Jianqin Zhou, Wanquan Liu, Xifeng Wang
2015Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism.
Wenjun Fan, Zhihui Du, David Fernández, Xinning Hui
2015Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan
2015Efficient and Secure Many-to-One Signature Delegation.
Rajeev Anand Sahu, Vishal Saraswat
2015Ensuring Kernel Integrity Using KIPBMFH.
Zhifeng Chen, Qingbao Li, Songhui Guo, Ye Wang
2015Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups.
Jie Zhang, Aijun Ge, Siyu Xiao, Chuangui Ma
2015Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity.
Shoichi Hirose
2015Higher-Order Masking Schemes for Simon.
Jiehui Tang, Yongbin Zhou, Hailong Zhang, Shuang Qiu
2015How to Vote Privately Using Bitcoin.
Zhichao Zhao, T.-H. Hubert Chan
2015Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System.
Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
2015MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage.
Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li
2015Minimizing Databases Attack Surface Against SQL Injection Attacks.
Dimitris Geneiatakis
2015Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach.
Qian Zhang, Ying Jiang, Liping Ding
2015Multi-input Functional Encryption and Its Application in Outsourcing Computation.
Peili Li, Haixia Xu, Yuanyuan Ji
2015Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s.
Hong Xu, Ping Jia, Geshi Huang, Xuejia Lai
2015On Promise Problem of the Generalized Shortest Vector Problem.
Wenwen Wang, Kewei Lv
2015Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm.
Weiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han, Xiaoguang Zheng
2015Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks.
Paolo Palmieri
2015Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers Accuracy.
Viktor Monarev, Andrey Pestunov
2015QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations.
Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu
2015Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa Channel.
Xuanxuan Wang, Lihuan Jiang, Lars Thiele, Yongming Wang
2015Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang
2015Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks.
Depeng Chen, Daojing He, Sammy Chan
2015Strategy of Relations Collection in Factoring RSA Modulus.
Haibo Yu, Guoqiang Bai
2015Suffix Type String Matching Algorithms Based on Multi-windows and Integer Comparison.
Hongbo Fan, Shupeng Shi, Jing Zhang, Li Dong
2015TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
Bo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng
2015The Security of Polynomial Information of Diffie-Hellman Key.
Yao Wang, Kewei Lv
2015Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable.
Zhen Liu, Duncan S. Wong
2015Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance.
Dan Zhang, Guoqiang Bai
2015Verifiable Proxy Re-encryption from Indistinguishability Obfuscation.
Muhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo