Search dblp for Publications

export results for "toc:db/conf/iccsp/iccsp2021.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iccsp/0003HM21,
  author       = {Ting Ma and
                  Feng Hu and
                  Maode Ma},
  title        = {A LSTM-Based Channel Fingerprinting Method for Intrusion Detection},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {113--116},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357494},
  doi          = {10.1109/CSP51677.2021.9357494},
  timestamp    = {Tue, 02 Mar 2021 15:00:44 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/0003HM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Abushgra21,
  author       = {Abdulbast A. Abushgra},
  title        = {{SARG04} and {AK15} Protocols Based on the Run-Time Execution and
                  {QBER}},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {176--180},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357500},
  doi          = {10.1109/CSP51677.2021.9357500},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/Abushgra21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/BradyUH21,
  author       = {Mark A. Brady and
                  Ikram Ullah and
                  Paul J. M. Havinga},
  title        = {DOSing Distributed Ledger Technology: {IOTA}},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {55--61},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357600},
  doi          = {10.1109/CSP51677.2021.9357600},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/BradyUH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ButlerB21,
  author       = {Martin J. Butler and
                  Rika Butler},
  title        = {The Influence of Mobile Operating Systems on User Security Behavior},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {134--138},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357568},
  doi          = {10.1109/CSP51677.2021.9357568},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/ButlerB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ChengL21,
  author       = {Xinghua Cheng and
                  Zhilin Li},
  title        = {Using Boltzmann Entropy to Measure Scrambling Degree of Grayscale
                  Images},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357492},
  doi          = {10.1109/CSP51677.2021.9357492},
  timestamp    = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/ChengL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/CuiZY21,
  author       = {Yanchun Cui and
                  Kai Zhong and
                  Ansheng Yin},
  title        = {Trust Evaluation Algorithm based on Association Rule Extraction},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {50--54},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357609},
  doi          = {10.1109/CSP51677.2021.9357609},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/CuiZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Dauden-EsmelCVD21,
  author       = {Crist{\`{o}}fol Daud{\'{e}}n{-}Esmel and
                  Jordi Castell{\`{a}}{-}Roca and
                  Alexandre Viejo and
                  Josep Domingo{-}Ferrer},
  title        = {Lightweight Blockchain-based Platform for GDPR-Compliant Personal
                  Data Management},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {68--73},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357602},
  doi          = {10.1109/CSP51677.2021.9357602},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/Dauden-EsmelCVD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/FattahiM21,
  author       = {Jaouhar Fattahi and
                  Mohamed Mejri},
  title        = {SpaML: a Bimodal Ensemble Learning Spam Detector based on {NLP} Techniques},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {107--112},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357595},
  doi          = {10.1109/CSP51677.2021.9357595},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/FattahiM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/FattahiM21a,
  author       = {Jaouhar Fattahi and
                  Mohamed Mejri},
  title        = {Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory
                  Networks for Forensic Purposes},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {193--199},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357588},
  doi          = {10.1109/CSP51677.2021.9357588},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/FattahiM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/GaoLLWDL21,
  author       = {Haoyu Gao and
                  Leixiao Li and
                  Hao Lin and
                  Jianxiong Wan and
                  Dan Deng and
                  Jie Li},
  title        = {{DECH:} {A} Novel Attack Pattern of Cloud Environment and Its Countermeasures},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {117--122},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357594},
  doi          = {10.1109/CSP51677.2021.9357594},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/GaoLLWDL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Gupt0SR21,
  author       = {Krishn Kumar Gupt and
                  Meghana Kshirsagar and
                  Joseph P. Sullivan and
                  Conor Ryan},
  title        = {Automatic Test Case Generation for Vulnerability Analysis of Galois
                  Field Arithmetic Circuits},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357567},
  doi          = {10.1109/CSP51677.2021.9357567},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/Gupt0SR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/HasanLJ21,
  author       = {Md Abir Hasan and
                  Orion Sky Lawlor and
                  Nusrat Jahan},
  title        = {Forensic Analysis of Binary Structures of Video Files},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {200--204},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357570},
  doi          = {10.1109/CSP51677.2021.9357570},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/HasanLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/HuangCC21,
  author       = {Haiou Huang and
                  Jianfeng Chu and
                  Xiaochun Cheng},
  title        = {Trend Analysis and Countermeasure Research of DDoS Attack Under 5G
                  Network},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {153--160},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357499},
  doi          = {10.1109/CSP51677.2021.9357499},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/HuangCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/KohlerKK0M21,
  author       = {Daniel K{\"{o}}hler and
                  Eric Klieme and
                  Matthias Kreuseler and
                  Feng Cheng and
                  Christoph Meinel},
  title        = {Assessment of Remote Biometric Authentication Systems: Another Take
                  on the Quest to Replace Passwords},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {22--31},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357504},
  doi          = {10.1109/CSP51677.2021.9357504},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/KohlerKK0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LiHYWSL21,
  author       = {Kunchang Li and
                  Xu Han and
                  Yifan Yang and
                  Shuhao Wang and
                  Runhua Shi and
                  Jianbin Li},
  title        = {A Novel Edge Computing Offloading and Privacy-preserving Scheme for
                  Energy Internet},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {79--83},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357603},
  doi          = {10.1109/CSP51677.2021.9357603},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/LiHYWSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LiSXZLS21,
  author       = {Wei Li and
                  Jing Si and
                  Jianhua Xing and
                  Yongjing Zhang and
                  Deli Liu and
                  Zhiyuan Sui},
  title        = {Unified Attribute-Based Encryption Scheme for Industrial Internet
                  of Things},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {12--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357493},
  doi          = {10.1109/CSP51677.2021.9357493},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/LiSXZLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LinTL21,
  author       = {Liangjie Lin and
                  Yuchen Tian and
                  Yang Liu},
  title        = {A Blockchain-based Privacy-Preserving Recommendation Mechanism},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {74--78},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357604},
  doi          = {10.1109/CSP51677.2021.9357604},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/LinTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LiuJJXG21,
  author       = {Kunzan Liu and
                  Yuchen Jiao and
                  Ye Jin and
                  Xu Xiang and
                  Yuantao Gu},
  title        = {Dimensionality-reduced Secure Outlier Detection on Union of Subspaces},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {101--106},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357502},
  doi          = {10.1109/CSP51677.2021.9357502},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/LiuJJXG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LiuXZ21,
  author       = {Liwei Liu and
                  Maozhi Xu and
                  Guoqing Zhou},
  title        = {Analysis and Improvements to the Special Number Field Sieve for Discrete
                  Logarithm Problems},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {45--49},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357589},
  doi          = {10.1109/CSP51677.2021.9357589},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/LiuXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LongTL21,
  author       = {Hanlin Long and
                  Zhicheng Tian and
                  Yang Liu},
  title        = {Detecting Android Malware Based on Dynamic Feature Sequence and Attention
                  Mechanism},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {129--133},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357569},
  doi          = {10.1109/CSP51677.2021.9357569},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/LongTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LoumanVBRA21,
  author       = {Wouter Louman and
                  Mitchell Vernee and
                  Danique de Bruijn and
                  Babette van't Riet and
                  Hani Alers},
  title        = {Mobile Firewall applications: An analysis of usability and effectiveness},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {148--152},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357491},
  doi          = {10.1109/CSP51677.2021.9357491},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/LoumanVBRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/NgTC21,
  author       = {Sam Ng and
                  Tom{\'{a}}s Tauber and
                  Leslie Cheung},
  title        = {ECDSA-Compatible Privacy Preserving Signature With Designated Verifier},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {84--89},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357498},
  doi          = {10.1109/CSP51677.2021.9357498},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/NgTC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/PirkerFWS21,
  author       = {Dominic Pirker and
                  Thomas Fischer and
                  Harald Witschnig and
                  Christian Steger},
  title        = {velink - {A} Blockchain-based Shared Mobility Platform for Private
                  and Commercial Vehicles utilizing {ERC-721} Tokens},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {62--67},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357605},
  doi          = {10.1109/CSP51677.2021.9357605},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/PirkerFWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/PoelmanI21,
  author       = {Michelle Poelman and
                  Sarfraz Iqbal},
  title        = {Investigating the Compliance of the {GDPR:} Processing Personal Data
                  On {A} Blockchain},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {38--44},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357590},
  doi          = {10.1109/CSP51677.2021.9357590},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/PoelmanI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/SakkW21,
  author       = {Eric Sakk and
                  Shuangbao Paul Wang},
  title        = {Code Structures for Quantum Encryption and Decryption},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {7--11},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357606},
  doi          = {10.1109/CSP51677.2021.9357606},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/SakkW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ShahzadSS21,
  author       = {Haleh Shahzad and
                  Abdul Rahman Sattar and
                  Janahan Skandaraniyam},
  title        = {{DGA} Domain Detection using Deep Learning},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {139--143},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357591},
  doi          = {10.1109/CSP51677.2021.9357591},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/ShahzadSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangS21,
  author       = {Shuangbao Paul Wang and
                  Eric Sakk},
  title        = {Quantum Algorithms: Overviews, Foundations, and Speedups},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {17--21},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357505},
  doi          = {10.1109/CSP51677.2021.9357505},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangYDW21,
  author       = {Changqing Wang and
                  Xiangyu Yang and
                  Quancheng Du and
                  Jiaxiang Wang},
  title        = {Outage Performance of Satellite-UAV Network Framework based on {NOMA}},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {171--175},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357597},
  doi          = {10.1109/CSP51677.2021.9357597},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangYDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/XingSZLZ21,
  author       = {Jianhua Xing and
                  Jing Si and
                  Yongjing Zhang and
                  Wei Li and
                  Yuning Zheng},
  title        = {Research on Malware Variant Detection Method Based on Deep Neural
                  Network},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {144--147},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357503},
  doi          = {10.1109/CSP51677.2021.9357503},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/XingSZLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/YanWHC21,
  author       = {Xinyun Yan and
                  Chishe Wang and
                  Dahui Hao and
                  Min Chen},
  title        = {License Plate Detection Using Bayesian Method Based on Edge Features},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {205--211},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357598},
  doi          = {10.1109/CSP51677.2021.9357598},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/YanWHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/YangDY21,
  author       = {Yang Yang and
                  Xuehui Du and
                  Zhi Yang},
  title        = {PRADroid: Privacy Risk Assessment for Android Applications},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {90--95},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357608},
  doi          = {10.1109/CSP51677.2021.9357608},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/YangDY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ZainuddinDAMA21,
  author       = {Naqliyah Zainuddin and
                  Maslina Daud and
                  Sabariah Ahmad and
                  Mayasarah Maslizan and
                  Syafiqa Anneisa Leng Abdullah},
  title        = {A Study on Privacy Issues in Internet of Things (IoT)},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {96--100},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357592},
  doi          = {10.1109/CSP51677.2021.9357592},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/ZainuddinDAMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ZhangCFWW21,
  author       = {Xiaojian Zhang and
                  Liandong Chen and
                  Jie Fan and
                  Xiangqun Wang and
                  Qi Wang},
  title        = {Power IoT security protection architecture based on zero trust framework},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {166--170},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357607},
  doi          = {10.1109/CSP51677.2021.9357607},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/ZhangCFWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ZhangDL21,
  author       = {Haotian Zhang and
                  Weiyu Dong and
                  Jian Lin},
  title        = {A Partial-Lifting-Based Compiling Concolic Execution Approach},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {123--128},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357495},
  doi          = {10.1109/CSP51677.2021.9357495},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/ZhangDL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ZhaoLLHZM21,
  author       = {Gaofeng Zhao and
                  Rui Liu and
                  Yang Li and
                  Jin Huang and
                  Mingxuan Zhang and
                  Weiwei Miao},
  title        = {Multi-user broadcast authenticaiton in Power {LTE} Private Network
                  with Compressed Bloom Filter},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {161--165},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357596},
  doi          = {10.1109/CSP51677.2021.9357596},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/ZhaoLLHZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ZhengDZ21,
  author       = {Yan Zheng and
                  Weiyu Dong and
                  Jiangtao Zhao},
  title        = {ZeroDVS: Trace-Ability and Security Detection of Container Image Based
                  on Inheritance Graph},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {186--192},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357496},
  doi          = {10.1109/CSP51677.2021.9357496},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/ZhengDZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ZhouLY21,
  author       = {Youwu Zhou and
                  Mingjun Liu and
                  Aimin Ye},
  title        = {A Scheme of Key Distribution in Smart Grid},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357599},
  doi          = {10.1109/CSP51677.2021.9357599},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/ZhouLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccsp/2021,
  title        = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021},
  doi          = {10.1109/CSP51677.2021},
  isbn         = {978-1-7281-8621-4},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics