


default search action
24th ACISP 2019: Christchurch, New Zealand
- Julian Jang-Jaccard, Fuchun Guo:

Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings. Lecture Notes in Computer Science 11547, Springer 2019, ISBN 978-3-030-21547-7
Encryption
- Jongkil Kim

, Willy Susilo
, Joonsang Baek
, Surya Nepal, Dongxi Liu:
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. 3-20 - Tran Viet Xuan Phuong, Willy Susilo

, Guomin Yang
, Jun Yan
, Dongxi Liu:
Location Based Encryption. 21-38 - Yunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, Ximing Li

:
Group ID-Based Encryption with Equality Test. 39-57 - Alex Davidson, Amit Deo, Ela Lee, Keith Martin:

Strong Post-Compromise Secure Proxy Re-Encryption. 58-77 - Tapas Pal

, Ratna Dutta:
Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS Model. 78-96 - Tim van de Kamp

, David Stritzl
, Willem Jonker, Andreas Peter
:
Two-Client and Multi-client Functional Encryption for Set Intersection. 97-115
Post-quantum Security
- Arnaud Sipasseuth

, Thomas Plantard
, Willy Susilo
:
Improving the Security of the DRS Scheme with Uniformly Chosen Random Noise. 119-137 - Dung Hoang Duong

, Kazuhide Fukushima
, Shinsaku Kiyomoto, Partha Sarathi Roy
, Willy Susilo
:
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. 138-155 - Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad

, Joseph K. Liu, Jacob Cheng:
Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets. 156-175 - Li-Ping Wang, Jingwei Hu:

Two New Module-Code-Based KEMs with Rank Metric. 176-191 - Michael Kraitsberg, Yehuda Lindell

, Valery Osheter, Nigel P. Smart
, Younes Talibi Alaoui
:
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. 192-210 - Terry Shue Chien Lau

, Chik How Tan:
Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem. 211-228 - Nan Cui, Shengli Liu, Yunhua Wen, Dawu Gu:

Pseudorandom Functions from LWE: RKA Security and Application. 229-250 - Sean Murphy, Rachel Player:

\delta -subgaussian Random Variables in Cryptography. 251-268
Cryptocurrency Related
- Shuyang Tang

, Sherman S. M. Chow
, Zhiqiang Liu, Joseph K. Liu:
Fast-to-Finalize Nakamoto-Like Consensus. 271-288 - Lin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu:

A Flexible Instant Payment System Based on Blockchain. 289-306 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:

Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. 307-321 - Ziyu Wang, Jianwei Liu

, Zongyang Zhang, Yanting Zhang, Jiayuan Yin, Hui Yu, Wenmao Liu:
A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. 322-339
Foundations
- Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt:

Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. 343-361 - Atsunori Ichikawa, Wakaha Ogata

, Koki Hamada
, Ryo Kikuchi:
Efficient Secure Multi-Party Protocols for Decision Tree Classification. 362-380 - Willy Susilo

, Joseph Tonien
, Guomin Yang
:
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. 381-398 - Lucas Schabhüser, Denis Butin, Johannes Buchmann:

Function-Dependent Commitments from Homomorphic Authenticators. 399-418 - Geng Li, Jianwei Liu

, Zongyang Zhang:
Security Against Subversion in a Multi-surveillant Setting. 419-437
System and Network Security
- Wei Zong

, Yang-Wai Chow
, Willy Susilo
:
Dimensionality Reduction and Visualization of Network Intrusion Detection Data. 441-455 - Timothy Curry, Devon Callahan, Benjamin Fuller

, Laurent Michel:
DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks. 456-474 - Liang Zheng, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang:

A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs. 475-493 - Mohammadreza Ashouri

:
Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications. 494-513 - Jaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo

, Qingkai Zeng:
AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords. 514-532 - Xiaojian Pang, Li Yang, Maozhen Liu, Jianfeng Ma:

MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone. 533-551
Symmetric Cryptography
- Yunwen Liu

, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. 555-572 - Chunbo Zhu, Gaoli Wang, Boyu Zhu:

Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192. 573-587 - Yusuke Naito:

A Highly Secure MAC from Tweakable Blockciphers with Support for Short Tweaks. 588-606
Short Papers
- Dongxue Pan, Bei Liang

, Hongda Li, Peifang Ni:
Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications. 609-619 - Weixuan Li, Wei Yu, Bao Li, Xuejun Fan:

Speeding up Scalar Multiplication on Koblitz Curves Using \mu _4 Coordinates. 620-629 - Xuejun Fan, Song Tian, Bao Li, Weixuan Li:

Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields. 630-638 - Yaoan Jin, Atsuko Miyaji

:
Secure and Compact Elliptic Curve Cryptosystems. 639-650 - Debanjan Sadhya

, Bodhi Chakraborty
:
A Quantitative Study of Attribute Based Correlation in Micro-databases and Its Effects on Privacy. 651-659 - Yi-Ting Huang, Yu-Yuan Chen, Chih-Chun Yang, Yeali S. Sun, Shun-Wen Hsiao

, Meng Chang Chen
:
Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network. 660-668 - Dunming Li, Jenwen Mao

, Fuke Shen:
A Novel Semi-supervised Adaboost Technique Based on Improved Tri-training. 669-678 - Woojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim:

Automated Cash Mining Attacks on Mobile Advertising Networks. 679-686

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














