


default search action
8. ATIS 2017: Auckland, New Zealand
- Lynn Batten, Dong Seong Kim, Xuyun Zhang

, Gang Li:
Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings. Communications in Computer and Information Science 719, Springer 2017, ISBN 978-981-10-5420-4
Crypto Algorithms and Applications
- Michal Kedziora, Yang-Wai Chow

, Willy Susilo
:
Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems. 3-13 - Praveen Gauravaram

, Shoichi Hirose, Douglas Stebila
:
Security Analysis of a Design Variant of Randomized Hashing. 14-22 - Mohammad Hossein Yalame, Mohammad Hossein Farzam

, Siavash Bayat Sarmadi:
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer. 23-34 - S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan:

An Efficient Non-transferable Proxy Re-encryption Scheme. 35-47 - Wenjie Qin, Kewei Lv:

Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce. 48-57 - Sourya Kakarla

, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury:
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES. 58-72
Privacy Preserving Techniques
- Kaleb L. Leemaqz, Sharon X. Lee, Geoffrey J. McLachlan

:
Private Distributed Three-Party Learning of Gaussian Mixture Models. 75-87 - Sibghat Ullah Bazai, Julian Jang-Jaccard

, Xuyun Zhang
:
A Privacy Preserving Platform for MapReduce. 88-99 - Le Trieu Phong, Yoshinori Aono, Takuya Hayashi

, Lihua Wang
, Shiho Moriai:
Privacy-Preserving Deep Learning: Revisited and Enhanced. 100-110
Attacks
- Bo Sun, Xiapu Luo

, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
:
Characterizing Promotional Attacks in Mobile App Store. 113-127 - Takeru Koie, Takanori Isobe, Yosuke Todo

, Masakatu Morii:
Low-Data Complexity Attacks on Camellia. 128-140 - Tetiana Yarygina:

RESTful Is Not Secure. 141-153
Malware and Malicious Events Detection
- Ruibin Zhang, Chi Yang, Shaoning Pang

, Hossein Sarrafzadeh:
UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space. 157-168 - Naqqash Aman, Yasir Saleem, Fahim H. Abbasi, Farrukh Shahzad:

A Hybrid Approach for Malware Family Classification. 169-180 - Muhamed Fauzi Bin Abbas, Thambipillai Srikanthan:

Low-Complexity Signature-Based Malware Detection for IoT Devices. 181-189
System and Network Security
- Xiang Tian, Yu Wang, Yujia Zhu, Yong Sun, Qingyun Liu:

De-anonymous and Anonymous Technologies for Network Traffic Release. 193-200 - Sang Guun Yoo

, Jhonattan J. Barriga
:
Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems. 201-213 - Christian Otterstad:

On the Effectiveness of Non-readable Executable Memory Against BROP. 214-221

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














