


default search action
11th ISPEC 2015: Beijing, China
- Javier López, Yongdong Wu:

Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings. Lecture Notes in Computer Science 9065, Springer 2015, ISBN 978-3-319-17532-4
System Security
- Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng:

Operating System Security Policy Hardening via Capability Dependency Graphs. 3-17 - Chenglong Wei, Wenchang Shi, Bo Qin, Bin Liang:

Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement. 18-32
Stream cipher I
- Riham AlTawy, Amr M. Youssef:

Differential Fault Analysis of Streebog. 35-49 - Shaoyu Du, Bin Zhang, Zhenqi Li, Dongdai Lin:

Fault Attacks on Stream Cipher Scream. 50-64 - Lin Ding

, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Wei Zhao:
New Related Key Attacks on the RAKAPOSHI Stream Cipher. 65-75
Analysis
- Xiaochao Sun, Bao Li, Xianhui Lu:

Cramer-Shoup Like Chosen Ciphertext Security from LPN. 79-95 - Liqiang Peng, Lei Hu, Zhangjie Huang, Jun Xu:

Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant. 96-108 - Weixuan Li, Wei Yu, Kunpeng Wang:

Analysis of Fractional ωmbNAF for Scalar Multiplication. 109-120 - Fariba Haddadi, Duc Le Cong

, Laura Porter, Nur Zincir-Heywood
:
On the Effectiveness of Different Botnet Detection Approaches. 121-135
Key Exchange Protocol
- Baoping Tian, Fushan Wei, Chuangui Ma:

Strongly Secure Key Exchange Protocol with Minimal KEM. 139-153 - Shijun Zhao, Qianying Zhang:

sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices. 154-167
Elliptic Curve Cryptography
- Song Tian, Wei Yu, Bao Li, Kunpeng Wang:

Models of Curves from GHS Attack in Odd Characteristic. 171-180 - Song Tian, Wei Yu, Bao Li, Kunpeng Wang:

Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves. 181-191 - Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu

:
Batch Blind Signatures on Elliptic Curves. 192-206
Stream cipher II
- Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao

, Ling Song, Jinyong Shan
, Xiaoshuang Ma:
Improved Differential Analysis of Block Cipher PRIDE. 209-219 - Chun Guo, Hailong Zhang, Dongdai Lin:

Estimating Differential-Linear Distinguishers and Applications to CTC2. 220-234 - Shaoyu Du, Zhenqi Li, Bin Zhang, Dongdai Lin:

Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI. 235-249
Authentication
- Erick Bauman, Yafeng Lu, Zhiqiang Lin:

Half a Century of Practice: Who Is Still Storing Plaintext Passwords? 253-267 - Michael Velten, Peter Schneider

, Sascha Wessel, Claudia Eckert:
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. 268-282 - Shantian Cheng, Juanyang Zhang:

Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. 283-297
Attribute-based Encryption
- Yutaka Kawai:

Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption. 301-315 - Jianghong Wei

, Xinyi Huang, Xuexian Hu, Wenfen Liu:
Revocable Threshold Attribute-Based Signature against Signing Key Exposure. 316-330 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:

Fully Secure Online/Offline Predicate and Attribute-Based Encryption. 331-345
Mobile Security
- Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng:

A Rapid and Scalable Method for Android Application Repackaging Detection. 349-364 - Craig Sanders, Ayush Shah, Shengzhi Zhang

:
Comprehensive Analysis of the Android Google Play's Auto-update Policy. 365-377 - Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang:

IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication. 378-392
Theory
- Dibyendu Roy, Ankita Chaturvedi, Sourav Mukhopadhyay:

New Constructions of T-function. 395-405 - Qingbin Wang, Shaozhen Chen, Aijun Ge

:
A New Lattice-Based Threshold Attribute-Based Signature Scheme. 406-420 - Lucjan Hanzlik, Miroslaw Kutylowski, Moti Yung:

Hard Invalidation of Electronic Signatures. 421-436
Implementation
- Wei Zhang, Yu Zhang:

Lightweight Function Pointer Analysis. 439-453 - Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen:

Accelerating RSA with Fine-Grained Parallelism Using GPU. 454-468 - Guangjun Fan, Yongbin Zhou, François-Xavier Standaert

, Dengguo Feng:
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes. 469-484 - Yunya Zhou, Jianwei Liu

, Hua Deng, Bo Qin, Lei Zhang:
Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records. 485-498 - Clémentine Gritti, Willy Susilo

, Thomas Plantard
:
Efficient File Sharing in Electronic Health Records. 499-513 - Jannik Dreier, Rosario Giustolisi

, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini:
A Framework for Analyzing Verifiability in Traditional and Electronic Exams. 514-529
Privay & Indistinguishability
- Liang Cheng, Shaoyin Cheng, Fan Jiang:

ADKAM: A-Diversity K-Anonymity Model via Microaggregation. 533-547 - Jina Kang, Hyoungshick Kim, Yun-Gyung Cheong, Jun Ho Huh:

Visualizing Privacy Risks of Mobile Applications through a Privacy Meter. 548-558 - Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, Fei Tang:

One-Round Witness Indistinguishability from Indistinguishability Obfuscation. 559-574

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














