Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icccsec/icccsec2018-3.bht:"
@inproceedings{DBLP:conf/icccsec/0004SLW18, author = {Xin Su and Weiqi Shi and Jiuchuan Lin and Xin Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {101--112}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_10}, doi = {10.1007/978-3-030-00012-7\_10}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/0004SLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenHNC18, author = {Haishan Chen and Wien Hong and Jiangqun Ni and Tung{-}Shou Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Reversible Data Hiding in Partially-Encrypted Images}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {670--679}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_61}, doi = {10.1007/978-3-030-00012-7\_61}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenHNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DongHWHWB18, author = {Yazhou Dong and Mengxing Huang and Di Wu and Xijun He and Zhaoqing Wang and Uzair Aslam Bhatti}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Study on the Development of {U.S.} Intercontinental Alliance Clean Renewable Energy Based on {CA-DEA} Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {310--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_29}, doi = {10.1007/978-3-030-00012-7\_29}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DongHWHWB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DuanLZSJ18, author = {Xintao Duan and Jingjing Liu and En Zhang and Haoxian Song and Kai Jia}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Image Encryption and Compression Based on a {VAE} Generative Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {79--89}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_8}, doi = {10.1007/978-3-030-00012-7\_8}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DuanLZSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HanXJ18, author = {Jin Han and Wen Long Xu and Yu Ting Jing}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A New Dependency Parsing Tree Generation Algorithm Based on the Semantic Dependency Relationship Between Words}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {403--411}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_37}, doi = {10.1007/978-3-030-00012-7\_37}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HanXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuYGT18, author = {Mingxing Hu and Qing Ye and Wei Gao and Yongli Tang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from Lattices}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {423--434}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_39}, doi = {10.1007/978-3-030-00012-7\_39}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HuYGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JiangKC18, author = {Wenting Jiang and Zhongmiao Kang and Yan Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Improvement of {STDM} Watermarking Algorithm Based on Watson Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {585--595}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_53}, doi = {10.1007/978-3-030-00012-7\_53}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/JiangKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JiangS18, author = {Mingfang Jiang and Guang Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {349--358}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_32}, doi = {10.1007/978-3-030-00012-7\_32}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/JiangS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LaiLTXZH18, author = {Hong Lai and Mingxing Luo and Li Tao and Fuyuan Xiao and Cheng Zhan and Xiaofang Hu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic Maps}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {479--489}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_44}, doi = {10.1007/978-3-030-00012-7\_44}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LaiLTXZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiCGZH18, author = {Ximing Li and Weizhao Chen and Yubin Guo and Senyang Zhang and Qiong Huang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Secure File Storage System Among Distributed Public Clouds}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {277--289}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_26}, doi = {10.1007/978-3-030-00012-7\_26}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiCGZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiHZWD18, author = {Chunhua Li and Jiaqi Hu and Ke Zhou and Yuanzhang Wang and Hongyu Deng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Using Blockchain for Data Auditing in Cloud Storage}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {335--345}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_31}, doi = {10.1007/978-3-030-00012-7\_31}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiHZWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiYLW18, author = {Cong Li and Xiaoyuan Yang and Yazhou Liu and Xu An Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The {CP-ABE} with Full Verifiability Outsourced Decryption and White-Box Traceability}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {707--719}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_64}, doi = {10.1007/978-3-030-00012-7\_64}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiYLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiYWZZLC18, author = {Li Li and Jier Yu and Bing Wang and Qili Zhou and Shanqing Zhang and Jianfeng Lu and Chin{-}Chen Chang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Multiple Schemes for Bike-Share Service Authentication Using {QR} Code and Visual Cryptography}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {629--640}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_57}, doi = {10.1007/978-3-030-00012-7\_57}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiYWZZLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LingMHL18, author = {Yunhao Ling and Sha Ma and Qiong Huang and Ximing Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {370--382}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_34}, doi = {10.1007/978-3-030-00012-7\_34}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LingMHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuH18, author = {Jiawei Liu and Yongfeng Huang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Focused Crawler Framework Based on Open Search Engine}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {56--68}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_6}, doi = {10.1007/978-3-030-00012-7\_6}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiuH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuWZG18, author = {Jianyi Liu and Fangyu Weng and Ru Zhang and Yunbiao Guo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {161--173}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_15}, doi = {10.1007/978-3-030-00012-7\_15}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuWZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LuLXG18, author = {Bin Lu and Fenlin Liu and Ping Xu and Xin Ge}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {506--518}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_46}, doi = {10.1007/978-3-030-00012-7\_46}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LuLXG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MaC18, author = {Chujiao Ma and John A. Chandy}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Error Tolerant {ASCA} on {FPGA}}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {563--572}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_51}, doi = {10.1007/978-3-030-00012-7\_51}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/MaC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MinL0CCM18, author = {Erxue Min and Jun Long and Qiang Liu and Jianjing Cui and Zhiping Cai and Junbo Ma}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{SU-IDS:} {A} Semi-supervised and Unsupervised Framework for Network Intrusion Detection}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {322--334}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_30}, doi = {10.1007/978-3-030-00012-7\_30}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/MinL0CCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MoHL18, author = {Jiaqing Mo and Zhongwang Hu and Yuhua Lin}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {490--505}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_45}, doi = {10.1007/978-3-030-00012-7\_45}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/MoHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/OgunseyiY18, author = {Taiwo Blessing Ogunseyi and Cheng Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Survey and Analysis of Cryptographic Techniques for Privacy Protection in Recommender Systems}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {691--706}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_63}, doi = {10.1007/978-3-030-00012-7\_63}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/OgunseyiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/RenLQ18, author = {Yongjun Ren and Yepeng Liu and Chengshan Qian}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Digital Continuity Guarantee Based on Data Consistency in Cloud Storage}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {3--11}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_1}, doi = {10.1007/978-3-030-00012-7\_1}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/RenLQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/RenZLZ18, author = {Yongjun Ren and Lin Zhou and Yepeng Liu and Xiaorui Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {174--183}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_16}, doi = {10.1007/978-3-030-00012-7\_16}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/RenZLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShenWZ18, author = {Wei Shen and Zhendong Wu and Jianwu Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Face Privacy Protection Algorithm Based on Block Scrambling and Deep Learning}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {359--369}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_33}, doi = {10.1007/978-3-030-00012-7\_33}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShenWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SongXZLMG18, author = {Jian Song and Bo{-}ru Xu and Guo{-}chao Zhang and Guangsong Li and Chuangui Ma and Ai{-}Jun Ge}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {90--100}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_9}, doi = {10.1007/978-3-030-00012-7\_9}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SongXZLMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SongZYL18, author = {Yanjun Song and Jing Zhang and Han Yan and Qianmu Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Multi-class Imbalanced Learning with One-Versus-One Decomposition: An Empirical Study}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {617--628}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_56}, doi = {10.1007/978-3-030-00012-7\_56}, timestamp = {Fri, 05 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SongZYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SuhuiQW18, author = {Ge Suhui and Wan Quan and Sun Wenhui}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Security Strategy of Campus Network Data Center in Cloud Environment}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {290--297}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_27}, doi = {10.1007/978-3-030-00012-7\_27}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SuhuiQW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SunCL18, author = {Jingzhang Sun and Chunjie Cao and Hui Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Searchable Encryption Scheme Based on {CPABE} with Attribute Update in a Cloud Medical Environment}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {265--276}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_25}, doi = {10.1007/978-3-030-00012-7\_25}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SunCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SunXCY18, author = {Yi{-}Ru Sun and Gang Xu and Xiu{-}Bo Chen and Yi{-}Xian Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Controlled Bidirectional Remote Preparation of Single- and Two-Qubit State}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {541--553}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_49}, doi = {10.1007/978-3-030-00012-7\_49}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SunXCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TanQTTX18, author = {Yun Tan and Jiaohua Qin and Ling Tan and Hao Tang and Xuyu Xiang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Survey on the New Development of Medical Image Security Algorithms}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {458--467}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_42}, doi = {10.1007/978-3-030-00012-7\_42}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/TanQTTX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TangWZY18, author = {Yongli Tang and Mingming Wang and Zongqu Zhao and Qing Ye}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Adaptively Chosen Ciphertext Secure Lattice {IBE} Based Programmable Hash Function in the Standard Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {468--478}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_43}, doi = {10.1007/978-3-030-00012-7\_43}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TangWZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TangXLCY18, author = {Xin Tang and Gang Xu and Kun{-}Chang Li and Xiu{-}Bo Chen and Yi{-}Xian Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Secure Multiparty Quantum Summation Based on d-Level Single Particles}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {680--690}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_62}, doi = {10.1007/978-3-030-00012-7\_62}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TangXLCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TaoLSH18, author = {Wenwei Tao and Song Liu and Yang Su and Chao Hu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Power Network Vulnerability Detection Based on Improved Adaboost Algorithm}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {641--650}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_58}, doi = {10.1007/978-3-030-00012-7\_58}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TaoLSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/Wang0W18, author = {Chong Wang and Ke Zhou and Ronglei Wei}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {QS-Code: {A} Quasi-Systematic Erasure Code with Partial Security for Cloud Storage}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {206--216}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_19}, doi = {10.1007/978-3-030-00012-7\_19}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/Wang0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangC18, author = {Changxu Wang and Jing Chu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Privacy-Preserved Prediction for Mobile Application Adoption}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {184--194}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_17}, doi = {10.1007/978-3-030-00012-7\_17}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangCF18, author = {Jilin Wang and Yingzi Chen and Xiaoqing Feng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Privacy-Preserving Credit Scoring on Cloud}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {195--205}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_18}, doi = {10.1007/978-3-030-00012-7\_18}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangPL18, author = {Haibin Wang and Daomeng Pan and Wenjie Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Quantum Private Comparison Based on Delegating Quantum Computation}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {660--669}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_60}, doi = {10.1007/978-3-030-00012-7\_60}, timestamp = {Tue, 16 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangTQ18, author = {Mingming Wang and Lu{-}Ting Tian and Zhiguo Qu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {23--31}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_3}, doi = {10.1007/978-3-030-00012-7\_3}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangTQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangYZC18, author = {Junshe Wang and Yuzi Yi and Hongbin Zhang and Ning Cao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Network Attack Prediction Method Based on Threat Intelligence}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {151--160}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_14}, doi = {10.1007/978-3-030-00012-7\_14}, timestamp = {Tue, 21 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangYZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangZYSYY18, author = {Zhiliang Wang and Changping Zhou and Yang Yu and Xingang Shi and Xia Yin and Jiangyuan Yao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning Method}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {44--55}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_5}, doi = {10.1007/978-3-030-00012-7\_5}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangZYSYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuLDSLY18, author = {Xiaotong Wu and Pingzeng Liu and Jianrui Ding and Changqing Song and Bangguo Li and Xueru Yu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research and Application of Traceability Model for Agricultural Products}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {217--226}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_20}, doi = {10.1007/978-3-030-00012-7\_20}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WuLDSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuW18, author = {Shaobing Wu and Changmei Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Big Data Security Framework Based on Encryption}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {528--540}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_48}, doi = {10.1007/978-3-030-00012-7\_48}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuW18a, author = {Jun Wu and Chunzhi Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Privacy Preserving for Big Data Based on Fuzzy Set}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {651--659}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_59}, doi = {10.1007/978-3-030-00012-7\_59}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WuW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuYZ0W18, author = {Faguo Wu and Wang Yao and Xiao Zhang and Zhiming Zheng and Wenhua Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {69--78}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_7}, doi = {10.1007/978-3-030-00012-7\_7}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WuYZ0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XieWNY18, author = {Lixia Xie and Ruixin Wei and Yuguang Ning and Hongyu Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Dynamic Risk Access Control Model for Cloud Platform}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {12--22}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_2}, doi = {10.1007/978-3-030-00012-7\_2}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XieWNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XieZY18, author = {Xiaolan Xie and Xiao Zhou and Tianwei Yuan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Trust Management Model in Cloud Manufacturing}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {234--244}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_22}, doi = {10.1007/978-3-030-00012-7\_22}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XieZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XuWHX18, author = {Yang Xu and Ziwang Wang and Lei Huang and Xiaoyao Xie}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Modeling and Analysis of a Hybrid Authentication Protocol for {VANET}}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {123--137}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_12}, doi = {10.1007/978-3-030-00012-7\_12}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/XuWHX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangWZ18, author = {Jiajia Yang and Zhendong Wu and Jianwu Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Robust Fingerprint Identification Method by Deep Learning with Gabor Filter Multidimensional Feature Expansion}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {447--457}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_41}, doi = {10.1007/978-3-030-00012-7\_41}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangZJHZ18, author = {Zhongliang Yang and Pengyu Zhang and Minyu Jiang and Yongfeng Huang and Yu{-}Jin Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{RITS:} Real-Time Interactive Text Steganography Based on Automatic Dialogue Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {253--264}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_24}, doi = {10.1007/978-3-030-00012-7\_24}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YangZJHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YeHGT18, author = {Qing Ye and Mingxing Hu and Wei Gao and Yongli Tang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Hierarchical Identity-Based Encryption Scheme from Lattices}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {412--422}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_38}, doi = {10.1007/978-3-030-00012-7\_38}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YeHGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YeYYZ18, author = {Qing Ye and Xiaomeng Yang and Xixi Yan and Zongqu Zhao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Efficient Group Signature Scheme Over {NTRU} Lattice}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {554--562}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_50}, doi = {10.1007/978-3-030-00012-7\_50}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YeYYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YinL18, author = {Qian Yin and Gang Luo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Hash-Based Public Key Cryptosystem}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {383--392}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_35}, doi = {10.1007/978-3-030-00012-7\_35}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YinL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YinZM18, author = {Hongjian Yin and Leyou Zhang and Yi Mu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {435--446}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_40}, doi = {10.1007/978-3-030-00012-7\_40}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YinZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YuCLLW18, author = {Xiang Yu and Shuang Chen and Yanbo Li and Hui Lu and Le Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {227--233}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_21}, doi = {10.1007/978-3-030-00012-7\_21}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YuCLLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YuYTY18, author = {Jinxia Yu and Chaochao Yang and Yongli Tang and Xixi Yan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {519--527}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_47}, doi = {10.1007/978-3-030-00012-7\_47}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YuYTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangCM18, author = {Leyou Zhang and Yilei Cui and Yi Mu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Improving Privacy-Preserving {CP-ABE} with Hidden Access Policy}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {596--605}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_54}, doi = {10.1007/978-3-030-00012-7\_54}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangGC18, author = {Shuai Zhang and Zhiwei Gao and Li Cui}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Modeling and Data Analysis of the Balise System}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {138--150}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_13}, doi = {10.1007/978-3-030-00012-7\_13}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangGYJM18, author = {Yanhua Zhang and Yong Gan and Yifeng Yin and Huiwen Jia and Yinghui Meng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Fuzzy Identity-Based Signature from Lattices for Identities in a Large Universe}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {573--584}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_52}, doi = {10.1007/978-3-030-00012-7\_52}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangGYJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangLSLY18, author = {Juanmei Zhang and Zichen Li and Yafei Sun and Boya Liu and Yatao Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Homomorphic Masking Defense Scheme Based on {RSA} Cryptography Algorithm}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {393--402}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_36}, doi = {10.1007/978-3-030-00012-7\_36}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangLSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangWGTZL18, author = {Linghao Zhang and Sheng Wang and Wei Gan and Chao Tang and Jie Zhang and Huihui Liang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{SLIDE:} An Efficient Secure Linguistic Steganography Detection Protocol}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {298--309}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_28}, doi = {10.1007/978-3-030-00012-7\_28}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangWGTZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhengZCCYL18, author = {Lijuan Zheng and Linhao Zhang and Meng Cui and Jianyou Chen and Shaobo Yang and Zhaoxuan Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Medical Information Access Control Method Based on Weighted Information Entropy}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {113--122}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_11}, doi = {10.1007/978-3-030-00012-7\_11}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhengZCCYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhouMJ0A18, author = {Honghao Zhou and Tinghuai Ma and Jing Jia and Yuan Tian and Mznah Al{-}Rodhaan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {EkCRNN: {A} kNN Privacy Preserving Query Algorithm Based on Circular Region Extension}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {32--43}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_4}, doi = {10.1007/978-3-030-00012-7\_4}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhouMJ0A18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhuHL18, author = {Hongguo Zhu and Xin Hai and Jiuchuan Lin}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Integral and Impossible Differential Cryptanalysis of {RC6}}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {606--616}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_55}, doi = {10.1007/978-3-030-00012-7\_55}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhuHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhuZWW18, author = {Xinfeng Zhu and Zhihao Zhang and Yanling Wang and Guohai Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {245--252}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_23}, doi = {10.1007/978-3-030-00012-7\_23}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhuZWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-3, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7}, doi = {10.1007/978-3-030-00012-7}, isbn = {978-3-030-00011-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.