


default search action
21. ACISP 2016: Melbourne, VIC, Australia
- Joseph K. Liu, Ron Steinfeld:

Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9723, Springer 2016, ISBN 978-3-319-40366-3
Signature and Key Management
- Rongmao Chen, Yi Mu, Willy Susilo

, Guomin Yang
, Fuchun Guo
, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. 3-20 - Shengmin Xu, Guomin Yang

, Yi Mu, Sha Ma:
Proxy Signature with Revocation. 21-36 - Arcangelo Castiglione

, Alfredo De Santis
, Barbara Masucci, Francesco Palmieri, Aniello Castiglione
:
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures. 37-54
Public Key and Identity-Based Encryption
- Xiaofen Wang, Yi Mu:

Content-Based Encryption. 57-72 - Zhe Xia, Xiaoyun Yang, Min Xiao

, Debiao He:
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry. 73-86 - Xiling Luo, Yili Ren

, Jingwen Liu, Jiankun Hu
, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu:
Identity-Based Group Encryption. 87-102 - Tran Viet Xuan Phuong, Guomin Yang

, Willy Susilo
, Kaitai Liang
:
Edit Distance Based Encryption and Its Application. 103-119 - Xiaodong Lin, Rongxing Lu:

Proxy Re-encryption with Delegatable Verifiability. 120-133 - Shifeng Sun, Udaya Parampalli

, Tsz Hon Yuen
, Yu Yu, Dawu Gu:
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions. 134-150
Searchable Encryption
- Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe Lin Jiang, Jin Li:

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage. 153-169 - Peng Jiang

, Yi Mu, Fuchun Guo
, Qiaoyan Wen:
Public Key Encryption with Authorized Keyword Search. 170-186 - Shiwei Zhang, Guomin Yang

, Yi Mu:
Linear Encryption with Keyword Search. 187-203
Broadcast Encryption
- Kai He, Jian Weng

, Man Ho Au
, Yijun Mao, Robert H. Deng
:
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. 207-222 - Jianchang Lai, Yi Mu, Fuchun Guo

, Willy Susilo
, Rongmao Chen:
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. 223-239
Mathematical Primitives
- Atsushi Takayasu, Noboru Kunihiro

:
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs. 243-257 - Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo

, Joseph Tonien
:
A New Attack on Three Variants of the RSA Cryptosystem. 258-268 - Takashi Yamakawa, Goichiro Hanaoka, Noboru Kunihiro

:
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information. 269-284 - Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:

Deterministic Encoding into Twisted Edwards Curves. 285-297
Symmetric Cipher
- Nasour Bagheri

, Florian Mendel
, Yu Sasaki:
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. 301-316 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch. 317-332 - Jiageng Chen

, Jesen Teh
, Chunhua Su, Azman Samsudin, Junbin Fang
:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. 333-346 - Kazuhiko Minematsu:

Authenticated Encryption with Small Stretch (or, How to Accelerate AERO). 347-362 - Keting Jia, Ning Wang:

Impossible Differential Cryptanalysis of 14-Round Camellia-192. 363-378 - Ling Song, Zhangjie Huang, Qianqian Yang:

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA. 379-394 - Jiqiang Lu:

On the Security of the LAC Authenticated Encryption Algorithm. 395-408 - Lingyue Qin, Huaifeng Chen, Xiaoyun Wang:

Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques. 409-424
Short Papers-Public Key and Identity-Based Encryption
- Dung Hoang Duong

, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme. 427-434
Short Papers-Biometric Security
- Ying-Han Pang

, Khor Ean Yee, Shih Yin Ooi:
Biometric Access Control with High Dimensional Facial Features. 437-445 - Shiran Pan, Shen Yan, Wen Tao Zhu:

Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes. 446-453
Short Papers-Digital Forensics
- Min Yang, Fei Xu, Kam-Pui Chow:

Interest Profiling for Security Monitoring and Forensic Investigation. 457-464
Short Papers-National Security Infrastructure
- Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:

Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats. 467-477
Short Papers-Mobile Security
- Yao Cheng, Yingjiu Li, Robert H. Deng

:
A Feasible No-Root Approach on Android. 481-489
Short Papers-Network Security
- Timothy Glennan, Christopher Leckie

, Sarah M. Erfani:
Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning. 493-501
Short Papers-Pseudo Random/One-way Function
- Jhordany Rodriguez Parra, Terence Chan

, Siu-Wai Ho
:
A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems. 505-513

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














