ICICS C

37 papers

YearTitle / Authors
2016A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu
2016A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun
2016A Practical Scheme for Data Secure Transport in VoIP Conferencing.
Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu
2016A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li
2016A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis.
Peizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang
2016Application of Stylometry to DarkWeb Forum User Identification.
Thanh Nghia Ho, Wee Keong Ng
2016Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS.
Martin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl
2016Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, Dengguo Feng
2016Compression-Based Integral Prior Classification for Improving Steganalysis.
Viktor Monarev, Ilja Duplischev, Andrey Pestunov
2016Differential Fault Analysis on Midori.
Wei Cheng, Yongbin Zhou, Laurent Sauvage
2016DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy.
Shen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen
2016ECDSA on Things: IoT Integrity Protection in Practise.
Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros G. Fragkiadakis
2016Group Verification Based Multiple-Differential Collision Attack.
Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai
2016How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity.
Sumit Kumar Debnath, Ratna Dutta
2016Identity in the Internet-of-Things (IoT): New Challenges and Opportunities.
Kwok-Yan Lam, Chi-Hung Chi
2016Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings
Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing
2016Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT.
Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin
2016Is it Good or Bad? Disclosure of Medical Ailments on Twitter.
B. S. Vidyalakshmi, Raymond K. Wong
2016Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin
2016Medical Record System Using Blockchain, Big Data and Tokenization.
Paul Tak Shing Liu
2016MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud.
Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu
2016Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study.
Xin Wang, Neng Gao, Lingchen Zhang, Zongbin Liu, Lei Wang
2016On the Robustness of Learning Parity with Noise.
Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu
2016Optimizing Secure Computation Programs with Private Conditionals.
Peeter Laud, Alisa Pankova
2016Privacy Leakage via Attribute Inference in Directed Social Networks.
Raymond K. Wong, B. S. Vidyalakshmi
2016Private Boolean Query Processing on Encrypted Data.
Hoang Giang Do, Wee Keong Ng
2016Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR.
Bo Song, Yiming Zhao
2016Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System.
Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun
2016SECapacity: A Secure Capacity Scheduler in YARN.
Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu
2016The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight.
Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
2016The Security of Individual Bit for XTR.
Kewei Lv, Si-Wei Ren, Wenjie Qin
2016The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture.
Robert Buhren, Julian Vetter, Jan Nordholz
2016The Variant of Remote Set Problem on Lattices.
Wenwen Wang, Kewei Lv, Jianing Liu
2016Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds.
Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin
2016Towards Trustworthy Smart Cyber-Physical Systems.
M. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini
2016Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3.
Da-Zhi Sun, Xiao-Hong Li
2016Weaknesses in Security Considerations Related to Chaos-Based Image Encryption.
Thomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl