


default search action
20th ISC 2017: Ho Chi Minh City, Vietnam
- Phong Q. Nguyen, Jianying Zhou:

Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings. Lecture Notes in Computer Science 10599, Springer 2017, ISBN 978-3-319-69658-4
Symmetric Cryptography
- Shoichi Hirose, Yu Sasaki, Kan Yasuda:

Rate-One AE with Security Under RUP. 3-20 - Oleg Zaikin

, Stepan Kochemazov
:
An Improved SAT-Based Guess-and-Determine Attack on the Alternating Step Generator. 21-38 - Daniel Dinu, Johann Großschädl, Yann Le Corre:

Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares. 39-57 - Li Lin, Wenling Wu, Yafei Zheng:

Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers. 58-76
Post-quantum Cryptography
- Dung Hoang Duong

, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU. 79-91 - Khoa Nguyen

, Benjamin Hong Meng Tan, Huaxiong Wang:
Zero-Knowledge Password Policy Check from Lattices. 92-113 - Cyprien de Saint Guilhem

, Nigel P. Smart, Bogdan Warinschi:
Generic Forward-Secure Key Agreement Without Signatures. 114-133
Public-Key Cryptography
- Kaisei Kajita

, Kazuto Ogawa, Eiichiro Fujisaki:
A Constant-Size Signature Scheme with Tighter Reduction from CDH Assumption. 137-154 - Jérémy Chotard, Duong Hieu Phan

, David Pointcheval
:
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms. 155-172 - Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari:

Watermarking Public-Key Cryptographic Functionalities and Implementations. 173-191
Authentication
- Handan Kilinç, Serge Vaudenay:

Contactless Access Control Based on Distance Bounding. 195-213 - Lam Tran, Thang Hoang, Thuc Dinh Nguyen, Deokjai Choi:

Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis. 214-229
Attacks
- Andriana Gkaniatsou, Myrto Arapinis, Aggelos Kiayias:

Low-Level Attacks in Bitcoin Wallets. 233-253 - Xingxing Wang, Dakui Wang, Xiaojun Chen, Rui Xu, Jinqiao Shi, Li Guo:

Improving Password Guessing Using Byte Pair Encoding. 254-268 - Xueyi Yang, Limin Liu, Lingchen Zhang, Weiyu Jiang, Shiran Pan:

How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack. 269-287
Privacy
- Weizhi Meng

, Fei Fei, Wenjuan Li
, Man Ho Au:
Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks. 291-308 - Carlo Brunetta

, Christos Dimitrakakis
, Bei Liang
, Aikaterini Mitrokotsa
:
A Differentially Private Encryption Scheme. 309-326
Mobile Security
- Md. Shahrear Iqbal, Mohammad Zulkernine:

Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts. 329-347 - Diming Zhang, Liangqiang Chen, Fei Xue, Hao Wu, Hao Huang:

T-MAC: Protecting Mandatory Access Control System Integrity from Malicious Execution Environment on ARM-Based Mobile Devices. 348-365 - Xiaohai Cai, Xiaozhuo Gu, Yuewu Wang, Quan Zhou, Zhenhuan Cao:

Enforcing ACL Access Control on Android Platform. 366-383
Software Security
- Haijiang Xie, Yuanyuan Zhang, Juanru Li, Dawu Gu:

Nightingale: Translating Embedded VM Code in x86 Binary Executables. 387-404 - Mohammad Ghorbani, Mehran S. Fallah:

Run-Time Verification for Observational Determinism Using Dynamic Program Slicing. 405-416 - Alessandro Bruni, Rosario Giustolisi

, Carsten Schuermann:
Automated Analysis of Accountability. 417-434
Network and System Security
- Boyeon Song, Sang-Soo Choi, Jangwon Choi, Jungsuk Song:

Visualization of Intrusion Detection Alarms Collected from Multiple Networks. 437-454 - Jianming Fu, Jianwei Huang, Lanxin Zhang:

Curtain: Keep Your Hosts Away from USB Attacks. 455-471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














