ISPEC C

28 papers

YearTitle / Authors
2013A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
2013A Digital Forensic Framework for Automated User Activity Reconstruction.
Jungin Kang, Sangwook Lee, Heejo Lee
2013About Hash into Montgomery Form Elliptic Curves.
Wei Yu, Kunpeng Wang, Bao Li, Song Tian
2013Accountable Trapdoor Sanitizable Signatures.
Junzuo Lai, Xuhua Ding, Yongdong Wu
2013Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks.
Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg
2013Attribute Specified Identity-Based Encryption.
Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi Jun He, Siu-Ming Yiu
2013Cryptanalysis of the OKH Authenticated Encryption Scheme.
Peng Wang, Wenling Wu, Liting Zhang
2013Efficient Attack Detection Based on a Compressed Model.
Shichao Jin, Okhee Kim, Tieming Chen
2013Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection.
Yuxin Meng, Lam-for Kwok
2013Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control.
Xiaofan Liu, Natasha Alechina, Brian Logan
2013Identity-Based Multisignature with Message Recovery.
Kefeng Wang, Yi Mu, Willy Susilo
2013Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher.
Ling Song, Lei Hu
2013Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme.
Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei
2013Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware.
Jairo Serrano, Eduardo César, Elisa Heymann, Barton P. Miller
2013Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
Robert H. Deng, Tao Feng
2013Joint Triple-Base Number System for Multi-Scalar Multiplication.
Wei Yu, Kunpeng Wang, Bao Li, Song Tian
2013Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model.
Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong
2013Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
2013Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang
2013Secure Content Delivery in DRM System with Consumer Privacy.
Dheerendra Mishra, Sourav Mukhopadhyay
2013Secure RFID Ownership Transfer Protocols.
Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan
2013Security Evaluation of Rakaposhi Stream Cipher.
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2013Simplified PACE|AA Protocol.
Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski
2013Situational Awareness for Improving Network Resilience Management.
Mixia Liu, Tao Feng, Paul Smith, David Hutchison
2013Software Protection with Obfuscation and Encryption.
Vivek Balachandran, Sabu Emmanuel
2013Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers.
Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang
2013Trusted Identity Management for Overlay Networks.
Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan
2013VulLocator: Automatically Locating Vulnerable Code in Binary Programs.
Yingjun Zhang, Kai Chen, Yifeng Lian