Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2017-2.bht:"
@inproceedings{DBLP:conf/acisp/0002T17, author = {Eunkyung Kim and Mehdi Tibouchi}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Secure {GLS} Recomposition for Sum-of-Square Cofactors}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {349--365}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_20}, doi = {10.1007/978-3-319-59870-3\_20}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/0002T17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AkterH17, author = {Mousumi Akter and Tanzima Hashem}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {249--260}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_14}, doi = {10.1007/978-3-319-59870-3\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AkterH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChowSTZ17, author = {Yang{-}Wai Chow and Willy Susilo and Joseph Tonien and Wei Zong}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {A {QR} Code Watermarking Approach Based on the {DWT-DCT} Technique}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {314--331}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_18}, doi = {10.1007/978-3-319-59870-3\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChowSTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DavidsonC17, author = {Alex Davidson and Carlos Cid}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {An Efficient Toolkit for Computing Private Set Operations}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {261--278}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_15}, doi = {10.1007/978-3-319-59870-3\_15}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DavidsonC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DumasZ17, author = {Jean{-}Guillaume Dumas and Vincent Zucca}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Prover Efficient Public Verification of Dense or Sparse/Structured Matrix-Vector Multiplication}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {115--134}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_7}, doi = {10.1007/978-3-319-59870-3\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DumasZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Emura17, author = {Keita Emura}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {193--213}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_11}, doi = {10.1007/978-3-319-59870-3\_11}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Emura17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ErwigFHHKKKLR17, author = {Andreas Erwig and Marc Fischlin and Martin Hald and Dominik Helm and Robert Kiel and Florian K{\"{u}}bler and Michael K{\"{u}}mmerlin and Jakob Laenge and Felix Rohrbach}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Redactable Graph Hashing, Revisited - (Extended Abstract)}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {398--405}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_24}, doi = {10.1007/978-3-319-59870-3\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ErwigFHHKKKLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FangYTLLWY17, author = {Ying Fang and Bo Yu and Yong Tang and Liu Liu and Zexin Lu and Yi Wang and Qiang Yang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {A New Malware Classification Approach Based on Malware Dynamic Analysis}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {173--189}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_10}, doi = {10.1007/978-3-319-59870-3\_10}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FangYTLLWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FarashahiH17, author = {Reza Rezaeian Farashahi and Seyed Gholamhossein Hosseini}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Differential Addition on Twisted Edwards Curves}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {366--378}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_21}, doi = {10.1007/978-3-319-59870-3\_21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FarashahiH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ForlerLLW17, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Reforgeability of Authenticated Encryption Schemes}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {19--37}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_2}, doi = {10.1007/978-3-319-59870-3\_2}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ForlerLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HattoriHMSW17, author = {Mitsuhiro Hattori and Takato Hirano and Nori Matsuda and Rina Shimizu and Ye Wang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {214--234}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_12}, doi = {10.1007/978-3-319-59870-3\_12}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HattoriHMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HeJLLJ17, author = {Jingnan He and Wenpan Jing and Bao Li and Xianhui Lu and Dingding Jia}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Dual-Mode Cryptosystem Based on the Learning with Errors Problem}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {443--451}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_29}, doi = {10.1007/978-3-319-59870-3\_29}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HeJLLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HorneN17, author = {Dwight Horne and Suku Nair}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {422--434}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_27}, doi = {10.1007/978-3-319-59870-3\_27}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HorneN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Horsch0MB17, author = {Moritz Horsch and Johannes Braun and Dominique Metz and Johannes Buchmann}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Update-Tolerant and Revocable Password Backup}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {390--397}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_23}, doi = {10.1007/978-3-319-59870-3\_23}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Horsch0MB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiangZC17, author = {Fan Jiang and Cen Zhang and Shaoyin Cheng}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {61--79}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_4}, doi = {10.1007/978-3-319-59870-3\_4}, timestamp = {Tue, 21 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiangZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LinTG17, author = {Yan Lin and Xiaoxiao Tang and Debin Gao}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {SafeStack + : Enhanced Dual Stack to Combat Data-Flow Hijacking}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {95--112}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_6}, doi = {10.1007/978-3-319-59870-3\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LinTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaitiGC17, author = {Swapan Maiti and Shamit Ghosh and Dipanwita Roy Chowdhury}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {On the Security of Designing a Cellular Automata Based Stream Cipher}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {406--413}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_25}, doi = {10.1007/978-3-319-59870-3\_25}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaitiGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MengHAL17, author = {Weizhi Meng and Lee Wang Hao and Man Ho Au and Zhe Liu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Exploring Effect of Location Number on Map-Based Graphical Password Authentication}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {301--313}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_17}, doi = {10.1007/978-3-319-59870-3\_17}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MengHAL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Naito17, author = {Yusuke Naito}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {38--57}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_3}, doi = {10.1007/978-3-319-59870-3\_3}, timestamp = {Wed, 13 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Naito17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PrabowoT17, author = {Theo Fanuela Prabowo and Chik How Tan}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Generating Complete Edwards Curves}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {335--348}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_19}, doi = {10.1007/978-3-319-59870-3\_19}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PrabowoT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QiangGJL17, author = {Weizhong Qiang and JiaZhen Guo and Hai Jin and Weifeng Li}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {JSFfox: Run-Timely Confining JavaScript for Firefox}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {135--150}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_8}, doi = {10.1007/978-3-319-59870-3\_8}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/QiangGJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QiangHZJWS17, author = {Weizhong Qiang and Yingda Huang and Deqing Zou and Hai Jin and Shizhen Wang and Guozhong Sun}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Fully Context-Sensitive {CFI} for {COTS} Binaries}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {435--442}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_28}, doi = {10.1007/978-3-319-59870-3\_28}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/QiangHZJWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RodofileSSDRF17, author = {Nicholas R. Rodofile and Thomas Schmidt and Sebastian T. Sherry and Christopher Djamaludin and Kenneth Radke and Ernest Foo}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {452--459}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_30}, doi = {10.1007/978-3-319-59870-3\_30}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RodofileSSDRF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SarkarS17, author = {Sumanta Sarkar and Habeeb Syed}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Analysis of Toeplitz {MDS} Matrices}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_1}, doi = {10.1007/978-3-319-59870-3\_1}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SarkarS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SinghSR17, author = {Abhishek Singh and Binanda Sengupta and Sushmita Ruj}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Certificate Transparency with Enhancements and Short Proofs}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {381--389}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_22}, doi = {10.1007/978-3-319-59870-3\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SinghSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunSWCLH17, author = {Hao Sun and Jinshu Su and Xiaofeng Wang and Rongmao Chen and Yujing Liu and Qiaolin Hu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {PriMal: Cloud-Based Privacy-Preserving Malware Detection}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {153--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_9}, doi = {10.1007/978-3-319-59870-3\_9}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ThomborsonJ17, author = {Clark D. Thomborson and Marc Jeanmougin}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Stegogames}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {414--421}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_26}, doi = {10.1007/978-3-319-59870-3\_26}, timestamp = {Wed, 26 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ThomborsonJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TianZYMY17, author = {Yangguang Tian and Shiwei Zhang and Guomin Yang and Yi Mu and Yong Yu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Privacy-Preserving k-time Authenticated Secret Handshakes}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {281--300}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_16}, doi = {10.1007/978-3-319-59870-3\_16}, timestamp = {Tue, 02 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TianZYMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YingK17, author = {Jason H. M. Ying and Noboru Kunihiro}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Solving the {DLP} with Low Hamming Weight Product Exponents and Improved Attacks on the {GPS} Identification Scheme}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {460--467}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_31}, doi = {10.1007/978-3-319-59870-3\_31}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YingK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhanZGWN17, author = {Jiawei Zhan and Quan Zhou and Xiaozhuo Gu and Yuewu Wang and Yingjiao Niu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Splitting Third-Party Libraries' Privileges from Android Apps}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {80--94}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_5}, doi = {10.1007/978-3-319-59870-3\_5}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhanZGWN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhouXLXP17, author = {Fucai Zhou and Zifeng Xu and Yuxi Li and Jian Xu and Su Peng}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Private Graph Intersection Protocol}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {235--248}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_13}, doi = {10.1007/978-3-319-59870-3\_13}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhouXLXP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2017-2, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3}, doi = {10.1007/978-3-319-59870-3}, isbn = {978-3-319-59869-7}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.