Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ispec/ispec2014.bht:"
@inproceedings{DBLP:conf/ispec/AbdallaCFJN14, author = {Michel Abdalla and Herv{\'{e}} Chabanne and Houda Ferradi and Julien Jainski and David Naccache}, editor = {Xinyi Huang and Jianying Zhou}, title = {Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {8--14}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_2}, doi = {10.1007/978-3-319-06320-1\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AbdallaCFJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/AuS14, author = {Man Ho Au and Willy Susilo}, editor = {Xinyi Huang and Jianying Zhou}, title = {Two-Party (Blind) Ring Signatures and Their Applications}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {403--417}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_30}, doi = {10.1007/978-3-319-06320-1\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AuS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChenMS14, author = {Jiageng Chen and Atsuko Miyaji and Chunhua Su}, editor = {Xinyi Huang and Jianying Zhou}, title = {Distributed Pseudo-Random Number Generation and Its Application to Cloud Database}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {373--387}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_28}, doi = {10.1007/978-3-319-06320-1\_28}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ChenMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChenWHZHS14, author = {Chien{-}Ming Chen and Mu{-}En Wu and Bing{-}Zhe He and Xinying Zheng and Chieh Hsing and Hung{-}Min Sun}, editor = {Xinyi Huang and Jianying Zhou}, title = {A Methodology for Hook-Based Kernel Level Rootkits}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {119--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_10}, doi = {10.1007/978-3-319-06320-1\_10}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ChenWHZHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CuiGLX14, author = {Shujie Cui and Johann Gro{\ss}sch{\"{a}}dl and Zhe Liu and Qiuliang Xu}, editor = {Xinyi Huang and Jianying Zhou}, title = {High-Speed Elliptic Curve Cryptography on the {NVIDIA} {GT200} Graphics Processing Unit}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {202--216}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_16}, doi = {10.1007/978-3-319-06320-1\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CuiGLX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Gollmann14, author = {Dieter Gollmann}, editor = {Xinyi Huang and Jianying Zhou}, title = {Access Control in and Around the Browser}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {1--7}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_1}, doi = {10.1007/978-3-319-06320-1\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Gollmann14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GuleriaD14, author = {Vandana Guleria and Ratna Dutta}, editor = {Xinyi Huang and Jianying Zhou}, title = {Efficient Adaptive Oblivious Transfer in {UC} Framework}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {271--286}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_21}, doi = {10.1007/978-3-319-06320-1\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GuleriaD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GuptaR14, author = {Kishan Chand Gupta and Indranil Ghosh Ray}, editor = {Xinyi Huang and Jianying Zhou}, title = {On Constructions of Circulant {MDS} Matrices for Lightweight Cryptography}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {564--576}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_41}, doi = {10.1007/978-3-319-06320-1\_41}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GuptaR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HanLCG14, author = {Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu}, editor = {Xinyi Huang and Jianying Zhou}, title = {Proofs of Retrievability Based on {MRD} Codes}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {330--345}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_25}, doi = {10.1007/978-3-319-06320-1\_25}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HanLCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HaoLML14, author = {Ronglin Hao and Bao Li and Bingke Ma and Xiaoqian Li}, editor = {Xinyi Huang and Jianying Zhou}, title = {Improved Preimage Attacks against Reduced {HAS-160}}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {524--536}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_38}, doi = {10.1007/978-3-319-06320-1\_38}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HaoLML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HouZXF14, author = {Yonggan Hou and Jianwei Zhuge and Dan Xin and Wenya Feng}, editor = {Xinyi Huang and Jianying Zhou}, title = {{SBE} - {A} Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {159--171}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_13}, doi = {10.1007/978-3-319-06320-1\_13}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HouZXF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JiHZL014, author = {Yuede Ji and Yukun He and Dewei Zhu and Qiang Li and Dong Guo}, editor = {Xinyi Huang and Jianying Zhou}, title = {A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {75--89}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_7}, doi = {10.1007/978-3-319-06320-1\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JiHZL014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Jiang0LWML14, author = {Tao Jiang and Xiaofeng Chen and Jin Li and Duncan S. Wong and Jianfeng Ma and Joseph K. Liu}, editor = {Xinyi Huang and Jianying Zhou}, title = {{TIMER:} Secure and Reliable Cloud Storage against Data Re-outsourcing}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {346--358}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_26}, doi = {10.1007/978-3-319-06320-1\_26}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Jiang0LWML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KutylowskiHKKK14, author = {Miroslaw Kutylowski and Lucjan Hanzlik and Kamil Kluczniak and Przemyslaw Kubiak and Lukasz Krzywiecki}, editor = {Xinyi Huang and Jianying Zhou}, title = {Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {42--59}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_5}, doi = {10.1007/978-3-319-06320-1\_5}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KutylowskiHKKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Li14, author = {Wulu Li}, editor = {Xinyi Huang and Jianying Zhou}, title = {New Variants of Lattice Problems and Their NP-Hardness}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {511--523}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_37}, doi = {10.1007/978-3-319-06320-1\_37}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Li14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiMWZW14, author = {Pei Li and Jian Mao and Ruilong Wang and Lihua Zhang and Tao Wei}, editor = {Xinyi Huang and Jianying Zhou}, title = {A Website Credibility Assessment Scheme Based on Page Association}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {105--118}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_9}, doi = {10.1007/978-3-319-06320-1\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiMWZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiangASWYY14, author = {Kaitai Liang and Man Ho Au and Willy Susilo and Duncan S. Wong and Guomin Yang and Yong Yu}, editor = {Xinyi Huang and Jianying Zhou}, title = {An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {448--461}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_33}, doi = {10.1007/978-3-319-06320-1\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiangASWYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuLB14, author = {Hongmei Liu and Songtao Li and Shan Bian}, editor = {Xinyi Huang and Jianying Zhou}, title = {Detecting Frame Deletion in {H.264} Video}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {262--270}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_20}, doi = {10.1007/978-3-319-06320-1\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiuLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LopezRC14, author = {Javier L{\'{o}}pez and Ruben Rios and Jorge Cu{\'{e}}llar}, editor = {Xinyi Huang and Jianying Zhou}, title = {Preserving Receiver-Location Privacy in Wireless Sensor Networks}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {15--27}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_3}, doi = {10.1007/978-3-319-06320-1\_3}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LopezRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MsgnaMM14, author = {Mehari Msgna and Konstantinos Markantonakis and Keith Mayes}, editor = {Xinyi Huang and Jianying Zhou}, title = {Precise Instruction-Level Side Channel Profiling of Embedded Processors}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {129--143}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_11}, doi = {10.1007/978-3-319-06320-1\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/MsgnaMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/NguyenCS14, author = {Vu Duc Nguyen and Yang{-}Wai Chow and Willy Susilo}, editor = {Xinyi Huang and Jianying Zhou}, title = {A {CAPTCHA} Scheme Based on the Identification of Character Locations}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {60--74}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_6}, doi = {10.1007/978-3-319-06320-1\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/NguyenCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/NojoumianS14, author = {Mehrdad Nojoumian and Douglas R. Stinson}, editor = {Xinyi Huang and Jianying Zhou}, title = {Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {302--317}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_23}, doi = {10.1007/978-3-319-06320-1\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/NojoumianS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Samarati14, author = {Pierangela Samarati}, editor = {Xinyi Huang and Jianying Zhou}, title = {Data Security and Privacy in the Cloud}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {28--41}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_4}, doi = {10.1007/978-3-319-06320-1\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Samarati14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TangLCP14, author = {Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng}, editor = {Xinyi Huang and Jianying Zhou}, title = {Efficient Hardware Implementation of {MQ} Asymmetric Cipher {PMI+} on FPGAs}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {187--201}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_15}, doi = {10.1007/978-3-319-06320-1\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TangLCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TangLL14, author = {Yi Tang and Piaoping Lin and Zhaokai Luo}, editor = {Xinyi Huang and Jianying Zhou}, title = {Obfuscating Encrypted Web Traffic with Combined Objects}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {90--104}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_8}, doi = {10.1007/978-3-319-06320-1\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TangLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TangLNL14, author = {Fei Tang and Hongda Li and Qihua Niu and Bei Liang}, editor = {Xinyi Huang and Jianying Zhou}, title = {Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {418--432}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_31}, doi = {10.1007/978-3-319-06320-1\_31}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TangLNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TuHGTLL14, author = {Chenyang Tu and Wei He and Neng Gao and Eduardo de la Torre and Zeyi Liu and Limin Liu}, editor = {Xinyi Huang and Jianying Zhou}, title = {A Progressive Dual-Rail Routing Repair Approach for {FPGA} Implementation of Crypto Algorithm}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {217--231}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_17}, doi = {10.1007/978-3-319-06320-1\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TuHGTLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangGLZ14, author = {Jing Wang and Le Guan and Limin Liu and Daren Zha}, editor = {Xinyi Huang and Jianying Zhou}, title = {Implementing a Covert Timing Channel Based on Mimic Function}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {247--261}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_19}, doi = {10.1007/978-3-319-06320-1\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangGLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangMSG14, author = {Kefeng Wang and Yi Mu and Willy Susilo and Fuchun Guo}, editor = {Xinyi Huang and Jianying Zhou}, title = {Attribute-Based Signature with Message Recovery}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {433--447}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_32}, doi = {10.1007/978-3-319-06320-1\_32}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangMSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangQF14, author = {Weijin Wang and Yu Qin and Dengguo Feng}, editor = {Xinyi Huang and Jianying Zhou}, title = {Automated Proof for Authorization Protocols of {TPM} 2.0 in Computational Model}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {144--158}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_12}, doi = {10.1007/978-3-319-06320-1\_12}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangQF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangWQZD14, author = {Huaqun Wang and Qianhong Wu and Bo Qin and Futai Zhang and Josep Domingo{-}Ferrer}, editor = {Xinyi Huang and Jianying Zhou}, title = {A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {388--402}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_29}, doi = {10.1007/978-3-319-06320-1\_29}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WangWQZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangWZ14, author = {Danhui Wang and An Wang and Xuexin Zheng}, editor = {Xinyi Huang and Jianying Zhou}, title = {Fault-Tolerant Linear Collision Attack: {A} Combination with Correlation Power Analysis}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {232--246}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_18}, doi = {10.1007/978-3-319-06320-1\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WeiZW14, author = {Puwen Wei and Yuliang Zheng and Wei Wang}, editor = {Xinyi Huang and Jianying Zhou}, title = {Multi-recipient Encryption in Heterogeneous Setting}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {462--480}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_34}, doi = {10.1007/978-3-319-06320-1\_34}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WeiZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuHHP14, author = {Jun Xu and Lei Hu and Zhangjie Huang and Liqiang Peng}, editor = {Xinyi Huang and Jianying Zhou}, title = {Modular Inversion Hidden Number Problem Revisited}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {537--551}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_39}, doi = {10.1007/978-3-319-06320-1\_39}, timestamp = {Sun, 13 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuHHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuTL14, author = {Hong Xu and Lin Tan and Xuejia Lai}, editor = {Xinyi Huang and Jianying Zhou}, title = {On the Recursive Construction of {MDS} Matrices for Lightweight Cryptography}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {552--563}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_40}, doi = {10.1007/978-3-319-06320-1\_40}, timestamp = {Sun, 30 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuTL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YuNRWCX14, author = {Yong Yu and Jianbing Ni and Jian Ren and Wei Wu and Lanxiang Chen and Qi Xia}, editor = {Xinyi Huang and Jianying Zhou}, title = {Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {359--372}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_27}, doi = {10.1007/978-3-319-06320-1\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/YuNRWCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Zhang14, author = {Mingwu Zhang}, editor = {Xinyi Huang and Jianying Zhou}, title = {ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {481--495}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_35}, doi = {10.1007/978-3-319-06320-1\_35}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Zhang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangLF14, author = {Jun Zhang and Xinran Li and Fang{-}Wei Fu}, editor = {Xinyi Huang and Jianying Zhou}, title = {Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {287--301}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_22}, doi = {10.1007/978-3-319-06320-1\_22}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ZhangLF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangWQDLS14, author = {Lei Zhang and Qianhong Wu and Bo Qin and Hua Deng and Jianwei Liu and Wenchang Shi}, editor = {Xinyi Huang and Jianying Zhou}, title = {Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {496--510}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_36}, doi = {10.1007/978-3-319-06320-1\_36}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ZhangWQDLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangZ14, author = {Jie Zhang and Futai Zhang}, editor = {Xinyi Huang and Jianying Zhou}, title = {Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {318--329}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_24}, doi = {10.1007/978-3-319-06320-1\_24}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhouWSYL14, author = {Hongwei Zhou and Xin Wu and Wenchang Shi and Jinhui Yuan and Bin Liang}, editor = {Xinyi Huang and Jianying Zhou}, title = {{HDROP:} Detecting {ROP} Attacks Using Performance Monitoring Counters}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {172--186}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_14}, doi = {10.1007/978-3-319-06320-1\_14}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhouWSYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2014, editor = {Xinyi Huang and Jianying Zhou}, title = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1}, doi = {10.1007/978-3-319-06320-1}, isbn = {978-3-319-06319-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.