


default search action
ICCSP 2017: Wuhan, China
- Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, ICCSP 2017, Wuhan, China, March 17 - 19, 2017. ACM 2017, ISBN 978-1-4503-4867-6

Cryptography Theory and Technology
- Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:

On the Construction of the 4 x 4 Lightest Circulant MDS Matrices. 1-6 - Hong Wang, Jie Guan:

On Equivalence with Output Sequence of Grain Model. 7-11 - Xuyang Wang, Aiqun Hu, Hao Fang:

Feasibility Analysis of Lattice-based Proxy Re-Encryption. 12-16 - Sergey Polikarpov, Dmitry Petrov

, Alexey Kozhevnikov:
On A Class Pseudo-Dynamic Substitutions PD-Sbox, With A Perfect Averaged Distribution of Differentials in Static Mode of Work. 17-21 - Yongfeng Niu, Yanfeng Qi:

Ternary Linear Codes with Few Weights from Functions with Two Variables. 22-27
Image Information Security and Encryption
- Hao Zhang, Tao Zhang, Huajin Chen:

Variance Analysis of Pixel-Value Differencing Steganography. 28-32 - Qi Gao, Zhi Li, Shuqin Chen:

A Video Dual Watermarking Algorithm Against Geometric Attack Based on Integer Wavelet and SIFT. 33-37 - Fenghua Li, Jingyang Yu, Lingcui Zhang, Zhe Sun

, Mengfan Lv:
A Privacy-Preserving Method for Photo Sharing in Instant Message Systems. 38-43
Network Information Security
- Xidong Zhang, Weiming Tong, Zhongwei Li:

Security Communication for AMI on Basis of ECC and ESP. 44-48 - Hongmu Han, Ruixuan Li:

A Practical Compartmentation Approach for the Android App Coexistence. 49-55 - Wenying Bao, Wenbin Yao, Ming Zong, Dongbin Wang:

Cross-site Scripting Attacks on Android Hybrid Applications. 56-61 - Aidin Ameri, Daryl Johnson:

Covert Channel over Network Time Protocol. 62-65 - Xin Sun, Xindai Lu, Hua Dai:

A Matrix Decomposition based Webshell Detection Method. 66-70 - Huawei Huang, Yunyun Qu, Lunzhi Deng:

Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem. 71-75 - Danni Liu, Lijuan Wang, Can Wang, Pengyuan Huo:

A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack. 76-80 - A. P. Pljonkin

:
Features of the Photon Pulse Detection Algorithm in the Quantum Key Distribution System. 81-84
Computer System Design and Security
- Mubashir Hussain

, Hui Guo:
Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems. 85-90 - Bowei Zou, Mingqiu Gao, Xiaochuan Cui:

Research on Information Security Framework of Intelligent Connected Vehicle. 91-95 - Jianwei Ding, Zhouguo Chen, Yue Zhao, Hong Su, Yubin Guo, Enbo Sun:

MGeT: Malware Gene-Based Malware Dynamic Analyses. 96-101 - Xiaoshuai Xin, Cancheng Liu, Bin Wang:

Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP Protocol. 102-106 - Jing Liu, Yingxu Lai, Shixuan Zhang:

FL-GUARD: A Detection and Defense System for DDoS Attack in SDN. 107-111 - Zhiyuan Zhao, Lei Sun:

Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing Environment. 112-118 - Xingang Wang, Kuo Guo, Zhigang Gai:

A Semi-Formal Multi-Policy Secure Model for Semantic Spatial Trajectories. 119-125 - B. Chandrasekar, Bharath Ramesh, Vishalakshi Prabhu, S. Sajeev, Pratik K. Mohanty, G. Shobha

:
Development of Intelligent Digital Certificate Fuzzer Tool. 126-130 - Mikhail M. Kucherov

, N. A. Bogulskaya:
Logical Language of Certificate-Based Access Control in Security Models. 131-135 - Kavitha P. Thomas, A. Prasad Vinod

, Neethu Robinson:
Online Biometric Authentication Using Subject-Specific Band Power features of EEG. 136-141 - Zhiqiang Jian, Long Chen:

A Defense Method against Docker Escape Attack. 142-146

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














