default search action
AsiaJCIS 2013: Seoul, Korea
- Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5075-6
Cryptographic Protocol
- D. J. Guan, Chen-Yu Tsai, Er-Shuo Zhuang:
Detect Zero by Using Symmetric Homomorphic Encryption. 1-7 - Chun-I Fan, Pei-Hsiu Ho, Jheng-Jia Huang, Yi-Fan Tseng:
Secure Certificateless Signature Scheme Supporting Batch Verification. 8-11
Authentication
- Rong Hu, Kirill Morozov, Tsuyoshi Takagi:
On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding. 12-18 - Wen-Shenq Juang:
An Efficient and Practical Fair Buyer-Anonymity Exchange Scheme Using Bilinear Pairings. 19-26 - Ji-Jian Chin, Rouzbeh Behnia, Swee-Huay Heng, Raphael Chung-Wei Phan:
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme. 27-32
Network Security I
- Hung Yu Chien:
Cryptanalysis on RFID Authentications Using Minimum Disclosure Approach. 33-40 - Chih-Hung Wang, Ji-Min Yang:
Adaptive Feature-Weighted Alert Correlation System Applicable in Cloud Environment. 41-47 - Takashi Matsunaka, Junpei Urakawa, Ayumu Kubota:
Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web. 48-55 - Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto:
Search Engine Based Investigation on Misconfiguration of Zone Transfer. 56-62
Network Security II
- Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai:
Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM. 63-68 - Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel. 69-76 - Ke-Wei Su, Kuo-Ping Wu, Hahn-Ming Lee, Te-En Wei:
Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis. 77-84 - Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, Heung Youl Youm:
Preventing Abuse of Cookies Stolen by XSS. 85-89
Digital Forensics
- Chung-Nan Chen, Raylin Tso, Chung-Huang Yang:
Design and Implementation of Digital Forensic Software for iPhone. 90-95 - Ya-Ting Chang, Min-Ju Chung, Chin-Feng Lee, Cheng-Ta Huang, Shiuh-Jeng Wang:
Memory Forensics for Key Evidence Investigations in Case Illustrations. 96-101 - Chi-Yao Weng, Cheng-Hsing Yang, Chun-I Fan, Kuan-Liang Liu, Hung-Min Sun:
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality. 102-107
International Standard/Others
- Sheikh Ziauddin, Bruno Martin:
Formal Analysis of ISO/IEC 9798-2 Authentication Standard Using AVISPA. 108-114 - Bright Gameli Mawudor:
Present Cyber Threat Management (Methodologies to Mitigate Evolving Cyber-Attacks). 115-121 - Ming-Chih Kao, Wen-Chung Kuo, Yu-Hsuan Pan:
Automatic Adding License Management Functionality for Android Applications. 122-126 - Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
A Scripting Language for Automating Secure Multiparty Computation. 127-134
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.