


default search action
21. ACISP 2016: Melbourne, VIC, Australia
- Joseph K. Liu, Ron Steinfeld:

Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9722, Springer 2016, ISBN 978-3-319-40252-9
Invited Papers
- Shuang Zhao, Xiapu Luo

, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, Man Ho Au
:
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing. 3-19 - Wei Chen, Xiapu Luo

, Chengyu Yin, Bin Xiao
, Man Ho Au
, Yajuan Tang:
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services. 20-39 - Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xingmin Cui, Eric Ke Wang, Jun-bin Fang

:
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids. 40-56 - Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao

:
Towards Bitcoin Payment Networks. 57-76 - Min Cherng Lee

, Robin Mitra
, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh
, Wun-She Yap
:
Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models. 77-93 - Zhe Liu, Johann Großschädl, Lin Li, Qiuliang Xu:

Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes. 94-112
National Security Infrastructure
- Alastair Nisbet, Andrew Woodward:

A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. 115-127 - Youngbae Song, Hyoungshick Kim, Jun Ho Huh:

On the Guessability of Resident Registration Numbers in South Korea. 128-138
Social Network Security
- Shen Yan, Shiran Pan, Yuhang Zhao, Wen Tao Zhu:

Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy. 141-157
Bitcoin Security
- Colin Boyd, Christopher Carr:

Fair Client Puzzles from the Bitcoin Blockchain. 161-177
Statistical Privacy
- Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou

, Tsuyoshi Takagi:
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database. 181-197 - Zhen Li, Wei Wu:

Reversible Data Hiding for Encrypted Images Based on Statistical Learning. 198-212
Network Security
- Shigang Liu, Yu Wang

, Chao Chen, Yang Xiang:
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection. 215-228
Smart City Security
- Catalin Gosman, Tudor Cornea, Ciprian Dobre

, Florin Pop, Aniello Castiglione
:
Putting the User in Control of the Intelligent Transportation System. 231-246
Digital Forensics
- Carsten Rudolph

:
Exploring the Space of Digital Evidence - Position Paper. 249-262
Lightweight Security
- Yanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, Kim-Kwang Raymond Choo

:
Towards Lightweight Anonymous Entity Authentication for IoT Applications. 265-280 - Shaohua Tang, Bo Lv, Wuqiang Shen:

Hybrid MQ Signature for Embedded Device. 281-290
Secure Batch Processing
- Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang

, Haifeng Qian, Yuan Zhou:
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. 293-309 - Yang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, Wei Hu:

Accelerating Oblivious Transfer with Batch Multi-exponentiation. 310-326
Pseudo Random/One-way Function
- Xun Yi

, Xuechao Yang
, Yong Feng
, Fengling Han
, Ron G. van Schyndel:
CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps. 329-342 - Avijit Dutta

, Mridul Nandi
, Goutam Paul:
One-Key Compression Function Based MAC with Security Beyond Birthday Bound. 343-358
Cloud Storage Security
- Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo

, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. 361-375 - Kaitai Liang

, Atsuko Miyaji
, Chunhua Su:
Secure and Traceable Framework for Data Circulation. 376-388 - Yong Yu

, Yannan Li
, Man Ho Au
, Willy Susilo
, Kim-Kwang Raymond Choo
, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. 389-405
Password/QR Code Security
- Yang-Wai Chow

, Willy Susilo
, Guomin Yang
, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi:
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. 409-425 - Moritz Horsch, Mario Schlipf, Johannes Braun, Johannes Buchmann:

Password Requirements Markup Language. 426-439
Functional Encryption and Attribute-Based Cryptosystem
- Zuoxia Yu, Man Ho Au

, Qiuliang Xu, Rupeng Yang, Jinguang Han
:
Leakage-Resilient Functional Encryption via Pair Encodings. 443-460 - Lin Hou, Junzuo Lai, Lixian Liu:

Secret Handshakes with Dynamic Expressive Matching Policy. 461-476 - Yinhao Jiang, Willy Susilo

, Yi Mu, Fuchun Guo
:
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. 477-494 - Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji

:
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption. 495-508 - Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. 509-524 - Peng Zhang, Zehong Chen, Kaitai Liang

, Shulan Wang, Ting Wang:
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update. 525-540

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














