


default search action
AsiaJCIS 2014: Wuhan, China
- Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5733-0

- Hiroki Kuzuno, Kenichi Magata:

Detecting Advertisement Module Network Behavior with Graph Modeling. 1-10 - Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai:

A Parameterless Learning Algorithm for Behavior-Based Detection. 11-18 - Takashi Matsunaka, Ayumu Kubota, Takahiro Kasama:

An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors. 19-25 - Jihong Kim:

On the False Positive Rate of the Bloom Filter in Case of Using Multiple Hash Functions. 26-30 - Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:

METRO: Measurement of End-to-End Route Trust. 31-38 - Nobuaki Furutani, Tao Ban, Junji Nakazato, Jumpei Shimamura, Jun Kitazono, Seiichi Ozawa:

Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets. 39-43 - Keiichirou Kurihara, Kazuki Katagishi:

A Simple Detection Method for DoS Attacks Based on IP Packets Entropy Values. 44-51 - Zengguang Liu, Xiaochun Yin, Hoonjae Lee:

An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW. 52-55 - Atsuko Miyaji

, Mazumder Rashed, Tsuyoshi Sawada:
A New (n, n) Blockcipher Hash Function: Apposite for Short Messages. 56-63 - Yuheng Yuan, Zhenzhong He, Zheng Gong, Weidong Qiu:

Acceleration of AES Encryption with OpenCL. 64-70 - Chu-Hsing Lin, Jung-Chun Liu, Cheng-Chieh Li, Po-Wei Chu:

Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation. 71-75 - D. J. Guan, Yu-Shan Cheng:

Parity Detection for Some Three-Modulus Residue Number System. 76-81 - Caixue Zhou:

Provably Secure and Efficient Multi-receiver Identity-Based Generalized Signcryption Scheme. 82-88 - Shengbo Peng, Ou Ruan, Jing Zhou, Zaixing Chen:

A New Identity-Based Authentication Scheme for SIP. 90-95 - Juanjuan Li, Zhenhua Liu, Longhui Zu:

Chosen-Ciphertext Secure Multi-use Unidirectional Attribute-Based Proxy Re-Encryptions. 96-103 - Junjie Qiu, Gi-Hyun Hwang, Hoonjae Lee:

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. 104-110 - Si-Wei Ren, Ke-Wei Lu:

Bit Security for Lucas-Based One-Way Function. 111-118 - Chun-I Fan, Wei-Zhe Sun, Shih-Wei Huang, Wen-Shenq Juang, Jheng-Jia Huang:

Strongly Privacy-Preserving Communication Protocol for VANETs. 119-126 - Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, Wen-Tsuen Chen:

Anonymous Credential Scheme Supporting Active Revocation. 127-132 - Yufeng Wang, Jing Xu:

Overview on Privacy-Preserving Profile-Matching Mechanisms in Mobile Social Networks in Proximity (MSNP). 133-140 - Teng Yu Huang, Hung-Yu Chien:

Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs. 141-147 - Shinichi Matsumoto, Kouichi Sakurai:

Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image. 148-155 - He-Ming Ruan, Chin-Laung Lei:

Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage. 156-163 - Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Yuji Yamaoka, Takanori Oikawa:

Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage. 164-169 - Yu-Chih Huang, Wen-Chung Kuo, Ching-Nung Yang

:
Data Hiding Based on Radix-2. 170-174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














