


default search action
15th ISPEC 2019: Kuala Lumpur, Malaysia
- Swee-Huay Heng, Javier López:

Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings. Lecture Notes in Computer Science 11879, Springer 2019, ISBN 978-3-030-34338-5
Cryptography I
- Sha Ma, Qiong Huang:

Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model. 3-19 - Joon Soo Yoo, Jeong-Hwan Hwang, Baek Kyung Song, Ji Won Yoon:

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme. 20-40 - Wai-Kong Lee

, Sedat Akleylek
, Wun-She Yap
, Bok-Min Goi
:
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme. 41-55 - Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You:

Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE. 56-72
System and Network Security
- Hiroki Kuzuno, Toshihiro Yamauchi

:
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism. 75-94 - Emanuele Petagna, Giuseppe Laurenza

, Claudio Ciccotelli
, Leonardo Querzoni
:
Peel the Onion: Recognition of Android Apps Behind the Tor Network. 95-112 - Sherif Saad, Farhan Mahmood, William Briguglio, Haytham Elmiligi:

JSLess: A Tale of a Fileless Javascript Memory-Resident Malware. 113-131
Security Protocol and Tool
- Pascal Lafourcade

, Daiki Miyahara
, Takaaki Mizuki
, Tatsuya Sasaki, Hideaki Sone:
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation. 135-151 - Radu Ciucanu, Pascal Lafourcade

, Marius Lombard-Platet, Marta Soare:
Secure Best Arm Identification in Multi-armed Bandits. 152-171 - Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat:

CATCHA: When Cats Track Your Movements Online. 172-193 - Raounak Benabidallah, Salah Sadou

, Brendan Le Trionnaire, Isabelle Borne:
Designing a Code Vulnerability Meta-scanner. 194-210
Access Control and Authentication
- Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos

, Andrea Saracino:
Using IFTTT to Express and Enforce UCON Obligations. 213-231 - Kazuhide Fukushima

, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki:
Evaluation of Software PUF Based on Gyroscope. 232-247 - Jiqiang Lu, Zhigang Zhao, Huaqun Guo:

White-Box Implementation of the KMAC Message Authentication Code. 248-270
Cryptography II
- Tiong-Sik Ng

, Syh-Yuan Tan
, Ji-Jian Chin
:
Improving Signature Schemes with Tight Security Reductions. 273-292 - Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao

, Kunpeng Wang, Wei Yu, Reza Azarderakhsh:
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings. 293-309 - Lukasz Krzywiecki

, Marta Slowik, Michal Szala:
Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios. 310-324 - Deepak Kumar Dalai

, Santu Pal
:
Recovering Internal States of Grain-v1. 325-337
Data and User Privacy
- Miroslaw Kutylowski, Jakub Lemiesz

, Marta Slowik
, Marcin Slowik, Kamil Kluczniak, Maciej Gebala:
GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures. 341-361 - Andrew Rae, Asma Patel

:
Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K. 362-380 - Kamalkumar R. Macwan

, Sankita J. Patel:
Privacy Preserving Approach in Dynamic Social Network Data Publishing. 381-398
Short Paper I
- Arnaud Sipasseuth

, Thomas Plantard
, Willy Susilo
:
Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications. 401-412 - Chang Seng Sin, Huey Voon Chen:

Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem. 413-422 - Peter T. Nkomo, Marijke Coetzee

:
Development Activities, Tools and Techniques of Secure Microservices Compositions. 423-433 - Nasim Maleki, Ali A. Ghorbani:

Generating Phishing Emails Using Graph Database. 434-449
Short Paper II
- Wenjuan Li

, Weizhi Meng
, Lam For Kwok
:
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. 453-463 - Chris Pelchen, David Jaeger, Feng Cheng, Christoph Meinel:

The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm. 464-475 - Mahdieh Safarzadeh, Hossein Gharaee, Amir Hossein Panahi:

A Novel and Comprehensive Evaluation Methodology for SIEM. 476-488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














