ISC C

26 papers

YearTitle / Authors
2017A Constant-Size Signature Scheme with Tighter Reduction from CDH Assumption.
Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
2017A Differentially Private Encryption Scheme.
Carlo Brunetta, Christos Dimitrakakis, Bei Liang, Aikaterini Mitrokotsa
2017An Improved SAT-Based Guess-and-Determine Attack on the Alternating Step Generator.
Oleg Zaikin, Stepan Kochemazov
2017Automated Analysis of Accountability.
Alessandro Bruni, Rosario Giustolisi, Carsten Schuermann
2017Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU.
Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
2017Contactless Access Control Based on Distance Bounding.
Handan Kilinç, Serge Vaudenay
2017Curtain: Keep Your Hosts Away from USB Attacks.
Jianming Fu, Jianwei Huang, Lanxin Zhang
2017Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts.
Md. Shahrear Iqbal, Mohammad Zulkernine
2017Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares.
Daniel Dinu, Johann Großschädl, Yann Le Corre
2017Enforcing ACL Access Control on Android Platform.
Xiaohai Cai, Xiaozhuo Gu, Yuewu Wang, Quan Zhou, Zhenhuan Cao
2017Generic Forward-Secure Key Agreement Without Signatures.
Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
2017Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks.
Weizhi Meng, Fei Fei, Wenjuan Li, Man Ho Au
2017Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms.
Jérémy Chotard, Duong Hieu Phan, David Pointcheval
2017How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack.
Xueyi Yang, Limin Liu, Lingchen Zhang, Weiyu Jiang, Shiran Pan
2017Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers.
Li Lin, Wenling Wu, Yafei Zheng
2017Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis.
Lam Tran, Thang Hoang, Thuc Dinh Nguyen, Deokjai Choi
2017Improving Password Guessing Using Byte Pair Encoding.
Xingxing Wang, Dakui Wang, Xiaojun Chen, Rui Xu, Jinqiao Shi, Li Guo
2017Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings
Phong Q. Nguyen, Jianying Zhou
2017Low-Level Attacks in Bitcoin Wallets.
Andriana Gkaniatsou, Myrto Arapinis, Aggelos Kiayias
2017Nightingale: Translating Embedded VM Code in x86 Binary Executables.
Haijiang Xie, Yuanyuan Zhang, Juanru Li, Dawu Gu
2017Rate-One AE with Security Under RUP.
Shoichi Hirose, Yu Sasaki, Kan Yasuda
2017Run-Time Verification for Observational Determinism Using Dynamic Program Slicing.
Mohammad Ghorbani, Mehran S. Fallah
2017T-MAC: Protecting Mandatory Access Control System Integrity from Malicious Execution Environment on ARM-Based Mobile Devices.
Diming Zhang, Liangqiang Chen, Fei Xue, Hao Wu, Hao Huang
2017Visualization of Intrusion Detection Alarms Collected from Multiple Networks.
Boyeon Song, Sang-Soo Choi, Jangwon Choi, Jungsuk Song
2017Watermarking Public-Key Cryptographic Functionalities and Implementations.
Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2017Zero-Knowledge Password Policy Check from Lattices.
Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang