:facetid:toc:\"db/conf/atis/atis2017.bht\"OK:facetid:toc:db/conf/atis/atis2017.bhtMuhamed Fauzi Bin AbbasThambipillai SrikanthanLow-Complexity Signature-Based Malware Detection for IoT Devices.ATIS181-1892017Conference and Workshop Papersclosedconf/atis/AbbasS1710.1007/978-981-10-5421-1_15https://doi.org/10.1007/978-981-10-5421-1_15https://dblp.org/rec/conf/atis/AbbasS17URL#2881833Naqqash AmanYasir Saleem 0002Fahim H. AbbasiFarrukh ShahzadA Hybrid Approach for Malware Family Classification.ATIS169-1802017Conference and Workshop Papersclosedconf/atis/AmanSAS1710.1007/978-981-10-5421-1_14https://doi.org/10.1007/978-981-10-5421-1_14https://dblp.org/rec/conf/atis/AmanSAS17URL#2881834Sibghat Ullah BazaiJulian Jang-JaccardXuyun ZhangA Privacy Preserving Platform for MapReduce.ATIS88-992017Conference and Workshop Papersclosedconf/atis/BazaiJZ1710.1007/978-981-10-5421-1_8https://doi.org/10.1007/978-981-10-5421-1_8https://dblp.org/rec/conf/atis/BazaiJZ17URL#2881835Praveen GauravaramShoichi HiroseDouglas StebilaSecurity Analysis of a Design Variant of Randomized Hashing.ATIS14-222017Conference and Workshop Papersclosedconf/atis/GauravaramHS1710.1007/978-981-10-5421-1_2https://doi.org/10.1007/978-981-10-5421-1_2https://dblp.org/rec/conf/atis/GauravaramHS17URL#2881836Sourya KakarlaSrinath MandavaDhiman SahaDipanwita Roy ChowdhuryOn the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES.ATIS58-722017Conference and Workshop Papersclosedconf/atis/KakarlaMSC1710.1007/978-981-10-5421-1_6https://doi.org/10.1007/978-981-10-5421-1_6https://dblp.org/rec/conf/atis/KakarlaMSC17URL#2881837Michal KedzioraYang-Wai ChowWilly SusiloDefeating Plausible Deniability of VeraCrypt Hidden Operating Systems.ATIS3-132017Conference and Workshop Papersclosedconf/atis/KedzioraCS1710.1007/978-981-10-5421-1_1https://doi.org/10.1007/978-981-10-5421-1_1https://dblp.org/rec/conf/atis/KedzioraCS17URL#2881838Takeru KoieTakanori Isobe 0001Yosuke TodoMasakatu MoriiLow-Data Complexity Attacks on Camellia.ATIS128-1402017Conference and Workshop Papersclosedconf/atis/KoieITM1710.1007/978-981-10-5421-1_11https://doi.org/10.1007/978-981-10-5421-1_11https://dblp.org/rec/conf/atis/KoieITM17URL#2881839Kaleb L. LeemaqzSharon X. LeeGeoffrey J. McLachlanPrivate Distributed Three-Party Learning of Gaussian Mixture Models.ATIS75-872017Conference and Workshop Papersclosedconf/atis/LeemaqzLM1710.1007/978-981-10-5421-1_7https://doi.org/10.1007/978-981-10-5421-1_7https://dblp.org/rec/conf/atis/LeemaqzLM17URL#2881840Christian OtterstadOn the Effectiveness of Non-readable Executable Memory Against BROP.ATIS214-2212017Conference and Workshop Papersclosedconf/atis/Otterstad1710.1007/978-981-10-5421-1_18https://doi.org/10.1007/978-981-10-5421-1_18https://dblp.org/rec/conf/atis/Otterstad17URL#2881841Le Trieu PhongYoshinori AonoTakuya Hayashi 0001Lihua Wang 0001Shiho MoriaiPrivacy-Preserving Deep Learning: Revisited and Enhanced.ATIS100-1102017Conference and Workshop Papersclosedconf/atis/PhongA0WM1710.1007/978-981-10-5421-1_9https://doi.org/10.1007/978-981-10-5421-1_9https://dblp.org/rec/conf/atis/PhongA0WM17URL#2881842Wenjie QinKewei LvRounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce.ATIS48-572017Conference and Workshop Papersclosedconf/atis/QinL1710.1007/978-981-10-5421-1_5https://doi.org/10.1007/978-981-10-5421-1_5https://dblp.org/rec/conf/atis/QinL17URL#2881843S. Sharmila Deva SelviArinjita PaulC. Pandu RanganAn Efficient Non-transferable Proxy Re-encryption Scheme.ATIS35-472017Conference and Workshop Papersclosedconf/atis/SelviPR1710.1007/978-981-10-5421-1_4https://doi.org/10.1007/978-981-10-5421-1_4https://dblp.org/rec/conf/atis/SelviPR17URL#2881844Bo SunXiapu LuoMitsuaki AkiyamaTakuya Watanabe 0001Tatsuya MoriCharacterizing Promotional Attacks in Mobile App Store.ATIS113-1272017Conference and Workshop Papersclosedconf/atis/SunLAWM1710.1007/978-981-10-5421-1_10https://doi.org/10.1007/978-981-10-5421-1_10https://dblp.org/rec/conf/atis/SunLAWM17URL#2881845Xiang TianYu WangYujia ZhuYong SunQingyun LiuDe-anonymous and Anonymous Technologies for Network Traffic Release.ATIS193-2002017Conference and Workshop Papersclosedconf/atis/TianWZSL1710.1007/978-981-10-5421-1_16https://doi.org/10.1007/978-981-10-5421-1_16https://dblp.org/rec/conf/atis/TianWZSL17URL#2881846Mohammad Hossein YalameMohammad Hossein FarzamSiavash Bayat SarmadiSecure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.ATIS23-342017Conference and Workshop Papersclosedconf/atis/YalameFS1710.1007/978-981-10-5421-1_3https://doi.org/10.1007/978-981-10-5421-1_3https://dblp.org/rec/conf/atis/YalameFS17URL#2881847Tetiana YaryginaRESTful Is Not Secure.ATIS141-1532017Conference and Workshop Papersclosedconf/atis/Yarygina1710.1007/978-981-10-5421-1_12https://doi.org/10.1007/978-981-10-5421-1_12https://dblp.org/rec/conf/atis/Yarygina17URL#2881848Sang Guun YooJhonattan J. BarrigaPrivacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems.ATIS201-2132017Conference and Workshop Papersclosedconf/atis/YooB1710.1007/978-981-10-5421-1_17https://doi.org/10.1007/978-981-10-5421-1_17https://dblp.org/rec/conf/atis/YooB17URL#2881849Ruibin ZhangChi YangShaoning PangHossein SarrafzadehUnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space.ATIS157-1682017Conference and Workshop Papersclosedconf/atis/ZhangYPS1710.1007/978-981-10-5421-1_13https://doi.org/10.1007/978-981-10-5421-1_13https://dblp.org/rec/conf/atis/ZhangYPS17URL#2881850Lynn BattenDong Seong Kim 0001Xuyun ZhangGang Li 0009Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, ProceedingsATISCommunications in Computer and Information Science719Springer2017Editorshipconf/atis/201710.1007/978-981-10-5421-1https://doi.org/10.1007/978-981-10-5421-1https://dblp.org/rec/conf/atis/2017URL#3036082