ISPEC C

39 papers

YearTitle / Authors
2015A Framework for Analyzing Verifiability in Traditional and Electronic Exams.
Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini
2015A New Lattice-Based Threshold Attribute-Based Signature Scheme.
Qingbin Wang, Shaozhen Chen, Aijun Ge
2015A Rapid and Scalable Method for Android Application Repackaging Detection.
Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng
2015ADKAM: A-Diversity K-Anonymity Model via Microaggregation.
Liang Cheng, Shaoyin Cheng, Fan Jiang
2015Accelerating RSA with Fine-Grained Parallelism Using GPU.
Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen
2015Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method.
Shantian Cheng, Juanyang Zhang
2015Analysis of Fractional ωmbNAF for Scalar Multiplication.
Weixuan Li, Wei Yu, Kunpeng Wang
2015Batch Blind Signatures on Elliptic Curves.
Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu
2015Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI.
Shaoyu Du, Zhenqi Li, Bin Zhang, Dongdai Lin
2015Comprehensive Analysis of the Android Google Play's Auto-update Policy.
Craig Sanders, Ayush Shah, Shengzhi Zhang
2015Cramer-Shoup Like Chosen Ciphertext Security from LPN.
Xiaochao Sun, Bao Li, Xianhui Lu
2015Differential Fault Analysis of Streebog.
Riham AlTawy, Amr M. Youssef
2015Efficient File Sharing in Electronic Health Records.
Clémentine Gritti, Willy Susilo, Thomas Plantard
2015Estimating Differential-Linear Distinguishers and Applications to CTC2.
Chun Guo, Hailong Zhang, Dongdai Lin
2015Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Chenglong Wei, Wenchang Shi, Bo Qin, Bin Liang
2015Fault Attacks on Stream Cipher Scream.
Shaoyu Du, Bin Zhang, Zhenqi Li, Dongdai Lin
2015Fully Secure Online/Offline Predicate and Attribute-Based Encryption.
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015Half a Century of Practice: Who Is Still Storing Plaintext Passwords?
Erick Bauman, Yafeng Lu, Zhiqiang Lin
2015Hard Invalidation of Electronic Signatures.
Lucjan Hanzlik, Miroslaw Kutylowski, Moti Yung
2015IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang
2015Improved Differential Analysis of Block Cipher PRIDE.
Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma
2015Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings
Javier López, Yongdong Wu
2015Lightweight Function Pointer Analysis.
Wei Zhang, Yu Zhang
2015Models of Curves from GHS Attack in Odd Characteristic.
Song Tian, Wei Yu, Bao Li, Kunpeng Wang
2015New Constructions of T-function.
Dibyendu Roy, Ankita Chaturvedi, Sourav Mukhopadhyay
2015New Related Key Attacks on the RAKAPOSHI Stream Cipher.
Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Wei Zhao
2015Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records.
Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, Lei Zhang
2015On the Effectiveness of Different Botnet Detection Approaches.
Fariba Haddadi, Duc Le Cong, Laura Porter, Nur Zincir-Heywood
2015On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng
2015One-Round Witness Indistinguishability from Indistinguishability Obfuscation.
Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, Fei Tang
2015Operating System Security Policy Hardening via Capability Dependency Graphs.
Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng
2015Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Yutaka Kawai
2015Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant.
Liqiang Peng, Lei Hu, Zhangjie Huang, Jun Xu
2015Revocable Threshold Attribute-Based Signature against Signing Key Exposure.
Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu
2015Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves.
Song Tian, Wei Yu, Bao Li, Kunpeng Wang
2015Strongly Secure Key Exchange Protocol with Minimal KEM.
Baoping Tian, Fushan Wei, Chuangui Ma
2015User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts.
Michael Velten, Peter Schneider, Sascha Wessel, Claudia Eckert
2015Visualizing Privacy Risks of Mobile Applications through a Privacy Meter.
Jina Kang, Hyoungshick Kim, Yun-Gyung Cheong, Jun Ho Huh
2015sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices.
Shijun Zhao, Qianying Zhang