ISPEC C

26 papers

YearTitle / Authors
2016A Formal Concept of Domain Pseudonymous Signatures.
Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski
2016A Host-Based Detection Method of Remote Access Trojan in the Early Stage.
Daichi Adachi, Kazumasa Omote
2016A Privacy Preserving Source Verifiable Encryption Scheme.
Zhongyuan Yao, Yi Mu, Guomin Yang
2016A Spark-Based DDoS Attack Detection Model in Cloud Services.
Jian Zhang, Yawei Zhang, Pin Liu, Jianbiao He
2016ARMv8 Shellcodes from 'A' to 'Z'.
Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache
2016Anonymizing Bitcoin Transaction.
Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang
2016Authenticated CAN Communications Using Standardized Cryptographic Techniques.
Zhuo Wei, Yanjiang Yang, Tieyan Li
2016Collision Attacks on CAESAR Second-Round Candidate: ELmD.
Jian Zhang, Wenling Wu, Yafei Zheng
2016Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network.
Adel D. Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb
2016Cryptanalysis of Midori128 Using Impossible Differential Techniques.
Zhan Chen, Huaifeng Chen, Xiaoyun Wang
2016Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013.
Jingguo Bi, Jiayang Liu
2016Efficient Tag Path Authentication Protocol with Less Tag Memory.
HongBing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao
2016Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU.
Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang
2016Homomorphically Encrypted Arithmetic Operations Over the Integer Ring.
Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
2016Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings
Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
2016KopperCoin - A Distributed File Storage with Financial Incentives.
Henning Kopp, Christoph Bösch, Frank Kargl
2016Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring.
Hong Wei Siew, Saw Chin Tan, Ching Kwang Lee
2016Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting.
Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji
2016Practical Signature Scheme from \varGamma Γ -Protocol.
Zhoujun Ma, Li Yang, Yunlei Zhao
2016Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo
2016Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.
Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia
2016RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits.
Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Piotr Syga
2016Security of SM4 Against (Related-Key) Differential Cryptanalysis.
Jian Zhang, Wenling Wu, Yafei Zheng
2016Structural Evaluation for Simon-Like Designs Against Integral Attack.
Huiling Zhang, Wenling Wu
2016The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity.
Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
2016Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography.
Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache