


default search action
AsiaJCIS 2013: Seoul, Korea
- Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5075-6

Cryptographic Protocol
- D. J. Guan, Chen-Yu Tsai, Er-Shuo Zhuang:

Detect Zero by Using Symmetric Homomorphic Encryption. 1-7 - Chun-I Fan, Pei-Hsiu Ho, Jheng-Jia Huang, Yi-Fan Tseng:

Secure Certificateless Signature Scheme Supporting Batch Verification. 8-11
Authentication
- Rong Hu, Kirill Morozov, Tsuyoshi Takagi:

On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding. 12-18 - Wen-Shenq Juang:

An Efficient and Practical Fair Buyer-Anonymity Exchange Scheme Using Bilinear Pairings. 19-26 - Ji-Jian Chin

, Rouzbeh Behnia, Swee-Huay Heng
, Raphael Chung-Wei Phan
:
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme. 27-32
Network Security I
- Hung Yu Chien:

Cryptanalysis on RFID Authentications Using Minimum Disclosure Approach. 33-40 - Chih-Hung Wang, Ji-Min Yang:

Adaptive Feature-Weighted Alert Correlation System Applicable in Cloud Environment. 41-47 - Takashi Matsunaka, Junpei Urakawa, Ayumu Kubota:

Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web. 48-55 - Yin Minn Pa Pa, Katsunari Yoshioka

, Tsutomu Matsumoto:
Search Engine Based Investigation on Misconfiguration of Zone Transfer. 56-62
Network Security II
- Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai:

Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM. 63-68 - Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:

Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel. 69-76 - Ke-Wei Su, Kuo-Ping Wu, Hahn-Ming Lee, Te-En Wei:

Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis. 77-84 - Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, Heung Youl Youm:

Preventing Abuse of Cookies Stolen by XSS. 85-89
Digital Forensics
- Chung-Nan Chen, Raylin Tso

, Chung-Huang Yang:
Design and Implementation of Digital Forensic Software for iPhone. 90-95 - Ya-Ting Chang, Min-Ju Chung, Chin-Feng Lee, Cheng-Ta Huang, Shiuh-Jeng Wang:

Memory Forensics for Key Evidence Investigations in Case Illustrations. 96-101 - Chi-Yao Weng, Cheng-Hsing Yang, Chun-I Fan, Kuan-Liang Liu, Hung-Min Sun:

Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality. 102-107
International Standard/Others
- Sheikh Ziauddin

, Bruno Martin
:
Formal Analysis of ISO/IEC 9798-2 Authentication Standard Using AVISPA. 108-114 - Bright Gameli Mawudor:

Present Cyber Threat Management (Methodologies to Mitigate Evolving Cyber-Attacks). 115-121 - Ming-Chih Kao, Wen-Chung Kuo, Yu-Hsuan Pan:

Automatic Adding License Management Functionality for Android Applications. 122-126 - Kung Chen

, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
A Scripting Language for Automating Secure Multiparty Computation. 127-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














