ISPEC C

42 papers

YearTitle / Authors
2014A CAPTCHA Scheme Based on the Identification of Character Locations.
Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
2014A Methodology for Hook-Based Kernel Level Rootkits.
Chien-Ming Chen, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun
2014A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches.
Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo
2014A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm.
Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu
2014A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer
2014A Website Credibility Assessment Scheme Based on Page Association.
Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei
2014ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage.
Mingwu Zhang
2014Access Control in and Around the Browser.
Dieter Gollmann
2014An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu
2014Attribute-Based Signature with Message Recovery.
Kefeng Wang, Yi Mu, Willy Susilo, Fuchun Guo
2014Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model.
Weijin Wang, Yu Qin, Dengguo Feng
2014Data Security and Privacy in the Cloud.
Pierangela Samarati
2014Detecting Frame Deletion in H.264 Video.
Hongmei Liu, Songtao Li, Shan Bian
2014Distributed Pseudo-Random Number Generation and Its Application to Cloud Database.
Jiageng Chen, Atsuko Miyaji, Chunhua Su
2014Efficient Adaptive Oblivious Transfer in UC Framework.
Vandana Guleria, Ratna Dutta
2014Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs.
Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
2014Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model.
Fei Tang, Hongda Li, Qihua Niu, Bei Liang
2014Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing.
Mehrdad Nojoumian, Douglas R. Stinson
2014Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis.
Danhui Wang, An Wang, Xuexin Zheng
2014Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki
2014HDROP: Detecting ROP Attacks Using Performance Monitoring Counters.
Hongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang
2014High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit.
Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu
2014Implementing a Covert Timing Channel Based on Mimic Function.
Jing Wang, Le Guan, Limin Liu, Daren Zha
2014Improved Preimage Attacks against Reduced HAS-160.
Ronglin Hao, Bao Li, Bingke Ma, Xiaoqian Li
2014Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia
2014Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools.
Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache
2014Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
Xinyi Huang, Jianying Zhou
2014Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups.
Jie Zhang, Futai Zhang
2014Modular Inversion Hidden Number Problem Revisited.
Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng
2014Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes.
Jun Zhang, Xinran Li, Fang-Wei Fu
2014Multi-recipient Encryption in Heterogeneous Setting.
Puwen Wei, Yuliang Zheng, Wei Wang
2014New Variants of Lattice Problems and Their NP-Hardness.
Wulu Li
2014Obfuscating Encrypted Web Traffic with Combined Objects.
Yi Tang, Piaoping Lin, Zhaokai Luo
2014On Constructions of Circulant MDS Matrices for Lightweight Cryptography.
Kishan Chand Gupta, Indranil Ghosh Ray
2014On the Recursive Construction of MDS Matrices for Lightweight Cryptography.
Hong Xu, Lin Tan, Xuejia Lai
2014Precise Instruction-Level Side Channel Profiling of Embedded Processors.
Mehari Msgna, Konstantinos Markantonakis, Keith Mayes
2014Preserving Receiver-Location Privacy in Wireless Sensor Networks.
Javier López, Ruben Rios, Jorge Cuéllar
2014Proofs of Retrievability Based on MRD Codes.
Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu
2014Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu, Wenchang Shi
2014SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine.
Yonggan Hou, Jianwei Zhuge, Dan Xin, Wenya Feng
2014TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu
2014Two-Party (Blind) Ring Signatures and Their Applications.
Man Ho Au, Willy Susilo