Search dblp for Publications

export results for "toc:db/conf/ispec/ispec2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ispec/AbdallaCFJN14,
  author       = {Michel Abdalla and
                  Herv{\'{e}} Chabanne and
                  Houda Ferradi and
                  Julien Jainski and
                  David Naccache},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Improving Thomlinson-Walker's Software Patching Scheme Using Standard
                  Cryptographic and Statistical Tools},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {8--14},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_2},
  doi          = {10.1007/978-3-319-06320-1\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/AbdallaCFJN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/AuS14,
  author       = {Man Ho Au and
                  Willy Susilo},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Two-Party (Blind) Ring Signatures and Their Applications},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {403--417},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_30},
  doi          = {10.1007/978-3-319-06320-1\_30},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/AuS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChenMS14,
  author       = {Jiageng Chen and
                  Atsuko Miyaji and
                  Chunhua Su},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Distributed Pseudo-Random Number Generation and Its Application to
                  Cloud Database},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {373--387},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_28},
  doi          = {10.1007/978-3-319-06320-1\_28},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ChenMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChenWHZHS14,
  author       = {Chien{-}Ming Chen and
                  Mu{-}En Wu and
                  Bing{-}Zhe He and
                  Xinying Zheng and
                  Chieh Hsing and
                  Hung{-}Min Sun},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {A Methodology for Hook-Based Kernel Level Rootkits},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {119--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_10},
  doi          = {10.1007/978-3-319-06320-1\_10},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ChenWHZHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CuiGLX14,
  author       = {Shujie Cui and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Zhe Liu and
                  Qiuliang Xu},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {High-Speed Elliptic Curve Cryptography on the {NVIDIA} {GT200} Graphics
                  Processing Unit},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {202--216},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_16},
  doi          = {10.1007/978-3-319-06320-1\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CuiGLX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Gollmann14,
  author       = {Dieter Gollmann},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Access Control in and Around the Browser},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_1},
  doi          = {10.1007/978-3-319-06320-1\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Gollmann14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GuleriaD14,
  author       = {Vandana Guleria and
                  Ratna Dutta},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Efficient Adaptive Oblivious Transfer in {UC} Framework},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {271--286},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_21},
  doi          = {10.1007/978-3-319-06320-1\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GuleriaD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GuptaR14,
  author       = {Kishan Chand Gupta and
                  Indranil Ghosh Ray},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {On Constructions of Circulant {MDS} Matrices for Lightweight Cryptography},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {564--576},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_41},
  doi          = {10.1007/978-3-319-06320-1\_41},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GuptaR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HanLCG14,
  author       = {Shuai Han and
                  Shengli Liu and
                  Kefei Chen and
                  Dawu Gu},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Proofs of Retrievability Based on {MRD} Codes},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {330--345},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_25},
  doi          = {10.1007/978-3-319-06320-1\_25},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HanLCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HaoLML14,
  author       = {Ronglin Hao and
                  Bao Li and
                  Bingke Ma and
                  Xiaoqian Li},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Improved Preimage Attacks against Reduced {HAS-160}},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {524--536},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_38},
  doi          = {10.1007/978-3-319-06320-1\_38},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HaoLML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HouZXF14,
  author       = {Yonggan Hou and
                  Jianwei Zhuge and
                  Dan Xin and
                  Wenya Feng},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {{SBE} - {A} Precise Shellcode Detection Engine Based on Emulation
                  and Support Vector Machine},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_13},
  doi          = {10.1007/978-3-319-06320-1\_13},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HouZXF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JiHZL014,
  author       = {Yuede Ji and
                  Yukun He and
                  Dewei Zhu and
                  Qiang Li and
                  Dong Guo},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection
                  Approaches},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {75--89},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_7},
  doi          = {10.1007/978-3-319-06320-1\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/JiHZL014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Jiang0LWML14,
  author       = {Tao Jiang and
                  Xiaofeng Chen and
                  Jin Li and
                  Duncan S. Wong and
                  Jianfeng Ma and
                  Joseph K. Liu},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {{TIMER:} Secure and Reliable Cloud Storage against Data Re-outsourcing},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {346--358},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_26},
  doi          = {10.1007/978-3-319-06320-1\_26},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Jiang0LWML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KutylowskiHKKK14,
  author       = {Miroslaw Kutylowski and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Przemyslaw Kubiak and
                  Lukasz Krzywiecki},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Forbidden City Model - Towards a Practice Relevant Framework for Designing
                  Cryptographic Protocols},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {42--59},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_5},
  doi          = {10.1007/978-3-319-06320-1\_5},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KutylowskiHKKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Li14,
  author       = {Wulu Li},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {New Variants of Lattice Problems and Their NP-Hardness},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {511--523},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_37},
  doi          = {10.1007/978-3-319-06320-1\_37},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Li14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiMWZW14,
  author       = {Pei Li and
                  Jian Mao and
                  Ruilong Wang and
                  Lihua Zhang and
                  Tao Wei},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {A Website Credibility Assessment Scheme Based on Page Association},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {105--118},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_9},
  doi          = {10.1007/978-3-319-06320-1\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiMWZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiangASWYY14,
  author       = {Kaitai Liang and
                  Man Ho Au and
                  Willy Susilo and
                  Duncan S. Wong and
                  Guomin Yang and
                  Yong Yu},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption
                  for Cloud Data Sharing},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {448--461},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_33},
  doi          = {10.1007/978-3-319-06320-1\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiangASWYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiuLB14,
  author       = {Hongmei Liu and
                  Songtao Li and
                  Shan Bian},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Detecting Frame Deletion in {H.264} Video},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {262--270},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_20},
  doi          = {10.1007/978-3-319-06320-1\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiuLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LopezRC14,
  author       = {Javier L{\'{o}}pez and
                  Ruben Rios and
                  Jorge Cu{\'{e}}llar},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Preserving Receiver-Location Privacy in Wireless Sensor Networks},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_3},
  doi          = {10.1007/978-3-319-06320-1\_3},
  timestamp    = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LopezRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MsgnaMM14,
  author       = {Mehari Msgna and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Precise Instruction-Level Side Channel Profiling of Embedded Processors},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {129--143},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_11},
  doi          = {10.1007/978-3-319-06320-1\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/MsgnaMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/NguyenCS14,
  author       = {Vu Duc Nguyen and
                  Yang{-}Wai Chow and
                  Willy Susilo},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {A {CAPTCHA} Scheme Based on the Identification of Character Locations},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {60--74},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_6},
  doi          = {10.1007/978-3-319-06320-1\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/NguyenCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/NojoumianS14,
  author       = {Mehrdad Nojoumian and
                  Douglas R. Stinson},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {302--317},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_23},
  doi          = {10.1007/978-3-319-06320-1\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/NojoumianS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Samarati14,
  author       = {Pierangela Samarati},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Data Security and Privacy in the Cloud},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {28--41},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_4},
  doi          = {10.1007/978-3-319-06320-1\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Samarati14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TangLCP14,
  author       = {Shaohua Tang and
                  Bo Lv and
                  Guomin Chen and
                  Zhiniang Peng},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Efficient Hardware Implementation of {MQ} Asymmetric Cipher {PMI+}
                  on FPGAs},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_15},
  doi          = {10.1007/978-3-319-06320-1\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TangLCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TangLL14,
  author       = {Yi Tang and
                  Piaoping Lin and
                  Zhaokai Luo},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Obfuscating Encrypted Web Traffic with Combined Objects},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {90--104},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_8},
  doi          = {10.1007/978-3-319-06320-1\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TangLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TangLNL14,
  author       = {Fei Tang and
                  Hongda Li and
                  Qihua Niu and
                  Bei Liang},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear
                  Group Model},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {418--432},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_31},
  doi          = {10.1007/978-3-319-06320-1\_31},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TangLNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TuHGTLL14,
  author       = {Chenyang Tu and
                  Wei He and
                  Neng Gao and
                  Eduardo de la Torre and
                  Zeyi Liu and
                  Limin Liu},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {A Progressive Dual-Rail Routing Repair Approach for {FPGA} Implementation
                  of Crypto Algorithm},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {217--231},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_17},
  doi          = {10.1007/978-3-319-06320-1\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TuHGTLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangGLZ14,
  author       = {Jing Wang and
                  Le Guan and
                  Limin Liu and
                  Daren Zha},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Implementing a Covert Timing Channel Based on Mimic Function},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {247--261},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_19},
  doi          = {10.1007/978-3-319-06320-1\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangGLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangMSG14,
  author       = {Kefeng Wang and
                  Yi Mu and
                  Willy Susilo and
                  Fuchun Guo},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Attribute-Based Signature with Message Recovery},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {433--447},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_32},
  doi          = {10.1007/978-3-319-06320-1\_32},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangMSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangQF14,
  author       = {Weijin Wang and
                  Yu Qin and
                  Dengguo Feng},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Automated Proof for Authorization Protocols of {TPM} 2.0 in Computational
                  Model},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {144--158},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_12},
  doi          = {10.1007/978-3-319-06320-1\_12},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangQF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangWQZD14,
  author       = {Huaqun Wang and
                  Qianhong Wu and
                  Bo Qin and
                  Futai Zhang and
                  Josep Domingo{-}Ferrer},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {388--402},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_29},
  doi          = {10.1007/978-3-319-06320-1\_29},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WangWQZD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangWZ14,
  author       = {Danhui Wang and
                  An Wang and
                  Xuexin Zheng},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Fault-Tolerant Linear Collision Attack: {A} Combination with Correlation
                  Power Analysis},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {232--246},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_18},
  doi          = {10.1007/978-3-319-06320-1\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WeiZW14,
  author       = {Puwen Wei and
                  Yuliang Zheng and
                  Wei Wang},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Multi-recipient Encryption in Heterogeneous Setting},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {462--480},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_34},
  doi          = {10.1007/978-3-319-06320-1\_34},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WeiZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuHHP14,
  author       = {Jun Xu and
                  Lei Hu and
                  Zhangjie Huang and
                  Liqiang Peng},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Modular Inversion Hidden Number Problem Revisited},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {537--551},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_39},
  doi          = {10.1007/978-3-319-06320-1\_39},
  timestamp    = {Sun, 13 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuHHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuTL14,
  author       = {Hong Xu and
                  Lin Tan and
                  Xuejia Lai},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {On the Recursive Construction of {MDS} Matrices for Lightweight Cryptography},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {552--563},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_40},
  doi          = {10.1007/978-3-319-06320-1\_40},
  timestamp    = {Sun, 30 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuTL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YuNRWCX14,
  author       = {Yong Yu and
                  Jianbing Ni and
                  Jian Ren and
                  Wei Wu and
                  Lanxiang Chen and
                  Qi Xia},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Improvement of a Remote Data Possession Checking Protocol from Algebraic
                  Signatures},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {359--372},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_27},
  doi          = {10.1007/978-3-319-06320-1\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/YuNRWCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Zhang14,
  author       = {Mingwu Zhang},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {ACP-lrFEM: Functional Encryption Mechanism with Automatic Control
                  Policy in the Presence of Key Leakage},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {481--495},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_35},
  doi          = {10.1007/978-3-319-06320-1\_35},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Zhang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangLF14,
  author       = {Jun Zhang and
                  Xinran Li and
                  Fang{-}Wei Fu},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Multi-receiver Authentication Scheme for Multiple Messages Based on
                  Linear Codes},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {287--301},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_22},
  doi          = {10.1007/978-3-319-06320-1\_22},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangLF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangWQDLS14,
  author       = {Lei Zhang and
                  Qianhong Wu and
                  Bo Qin and
                  Hua Deng and
                  Jianwei Liu and
                  Wenchang Shi},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Provably Secure Certificateless Authenticated Asymmetric Group Key
                  Agreement},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {496--510},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_36},
  doi          = {10.1007/978-3-319-06320-1\_36},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangWQDLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangZ14,
  author       = {Jie Zhang and
                  Futai Zhang},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Information-Theoretical Secure Verifiable Secret Sharing with Vector
                  Space Access Structures over Bilinear Groups},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {318--329},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_24},
  doi          = {10.1007/978-3-319-06320-1\_24},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhouWSYL14,
  author       = {Hongwei Zhou and
                  Xin Wu and
                  Wenchang Shi and
                  Jinhui Yuan and
                  Bin Liang},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {{HDROP:} Detecting {ROP} Attacks Using Performance Monitoring Counters},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_14},
  doi          = {10.1007/978-3-319-06320-1\_14},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhouWSYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2014,
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1},
  doi          = {10.1007/978-3-319-06320-1},
  isbn         = {978-3-319-06319-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics