Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ispec/ispec2017.bht:"
@inproceedings{DBLP:conf/ispec/AlavizadehADKJG17, author = {Hooman Alavizadeh and Hootan Alavizadeh and Kudakwashe Dube and Dong Seong Kim and Julian Jang{-}Jaccard and Hans W. Guesgen}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {860--876}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_54}, doi = {10.1007/978-3-319-72359-4\_54}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AlavizadehADKJG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/AlavizadehKHJ17, author = {Hooman Alavizadeh and Dong Seong Kim and Jin B. Hong and Julian Jang{-}Jaccard}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Effective Security Analysis for Combinations of {MTD} Techniques on Cloud Computing (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {539--548}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_32}, doi = {10.1007/978-3-319-72359-4\_32}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/AlavizadehKHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CaiLRL17, author = {Jun Cai and Jian{-}Zhen Luo and Jianliang Ruan and Yan Liu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Toward Fuzz Test Based on Protocol Reverse Engineering}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {892--897}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_56}, doi = {10.1007/978-3-319-72359-4\_56}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/CaiLRL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChangDX17, author = {Jinyong Chang and Honglong Dai and Maozhi Xu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {The {KDM-CCA} Security of {REACT}}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {85--101}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_5}, doi = {10.1007/978-3-319-72359-4\_5}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ChangDX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChenLWCLLAZ17, author = {Ting Chen and Xiaoqi Li and Ying Wang and Jiachi Chen and Zihao Li and Xiapu Luo and Man Ho Au and Xiaosong Zhang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {3--24}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_1}, doi = {10.1007/978-3-319-72359-4\_1}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ChenLWCLLAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChengWZ17, author = {Leixiao Cheng and Quanshui Wu and Yunlei Zhao}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Compact Lossy and All-but-One Trapdoor Functions from Lattice}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {279--296}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_16}, doi = {10.1007/978-3-319-72359-4\_16}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ChengWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChiangWFCWK17, author = {Mei{-}Ling Chiang and Jian{-}Kai Wang and Li{-}Chi Feng and Yang{-}Sen Chen and You{-}Chi Wang and Wen{-}Yu Kao}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {587--598}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_36}, doi = {10.1007/978-3-319-72359-4\_36}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ChiangWFCWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChowSB17, author = {Yang{-}Wai Chow and Willy Susilo and Joonsang Baek}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Covert {QR} Codes: How to Hide in the Crowd}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {678--693}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_42}, doi = {10.1007/978-3-319-72359-4\_42}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ChowSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CreadoL17, author = {Orhio Mark Creado and Phu Dung Le}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {648--659}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_40}, doi = {10.1007/978-3-319-72359-4\_40}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/CreadoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/DaiCHX17, author = {Honglong Dai and Jinyong Chang and Zhenduo Hou and Maozhi Xu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {The {ECCA} Security of Hybrid Encryptions}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {847--859}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_53}, doi = {10.1007/978-3-319-72359-4\_53}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/DaiCHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Datta17, author = {Pratish Datta}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {204--214}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_12}, doi = {10.1007/978-3-319-72359-4\_12}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/Datta17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/DinhSB17, author = {Trung Dinh and Ron Steinfeld and Nandita Bhattacharjee}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {297--319}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_17}, doi = {10.1007/978-3-319-72359-4\_17}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/DinhSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GaoLDLSL17, author = {Xinwei Gao and Lin Li and Jintai Ding and Jiqiang Liu and R. V. Saraswathy and Zhe Liu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Fast Discretized Gaussian Sampling and Post-quantum {TLS} Ciphersuite}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {551--565}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_33}, doi = {10.1007/978-3-319-72359-4\_33}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/GaoLDLSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GrittiCSP17, author = {Cl{\'{e}}mentine Gritti and Rongmao Chen and Willy Susilo and Thomas Plantard}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {485--505}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_29}, doi = {10.1007/978-3-319-72359-4\_29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GrittiCSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HanLX17, author = {Xuan Han and Yamin Liu and Haixia Xu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A User-Friendly Centrally Banked Cryptocurrency}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {25--42}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_2}, doi = {10.1007/978-3-319-72359-4\_2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HanLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HeLYWL17, author = {Kai He and Xueqiao Liu and Huaqiang Yuan and Wenhong Wei and Kaitai Liang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Hierarchical Conditional Proxy Re-Encryption: {A} New Insight of Fine-Grained Secure Data Sharing}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {118--135}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_7}, doi = {10.1007/978-3-319-72359-4\_7}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HeLYWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HeWLHQL17, author = {Shuangyu He and Qianhong Wu and Jingwen Liu and Wei Hu and Bo Qin and Yanan Li}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Secure Communications in Unmanned Aerial Vehicle Network}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {601--620}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_37}, doi = {10.1007/978-3-319-72359-4\_37}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/HeWLHQL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HuangZWC17, author = {Tianxiang Huang and Jianying Zhou and Yi Wang and Anyu Cheng}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {On the Security of In-Vehicle Hybrid Network: Status and Challenges}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {621--637}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_38}, doi = {10.1007/978-3-319-72359-4\_38}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/HuangZWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Hunter17, author = {Aaron Hunter}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Reasoning About Trust and Belief Change on a Social Network: {A} Formal Approach}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {783--801}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_49}, doi = {10.1007/978-3-319-72359-4\_49}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Hunter17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JiangCRDJY17, author = {Hang Jiang and Rui Chang and Lu Ren and Weiyu Dong and Liehui Jiang and Shuiqiao Yang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {An Effective Authentication for Client Application Using {ARM} TrustZone}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {802--813}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_50}, doi = {10.1007/978-3-319-72359-4\_50}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/JiangCRDJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KagaFNTMON17, author = {Yosuke Kaga and Masakazu Fujio and Ken Naganuma and Kenta Takahashi and Takao Murakami and Tetsushi Ohki and Masakatsu Nishigaki}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A Secure and Practical Signature Scheme for Blockchain Based on Biometrics}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {877--891}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_55}, doi = {10.1007/978-3-319-72359-4\_55}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KagaFNTMON17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KimKCKS17, author = {Jinwoo Kim and Kuyju Kim and Junsung Cho and Hyoungshick Kim and Sebastian Schrittwieser}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {663--677}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_41}, doi = {10.1007/978-3-319-72359-4\_41}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/KimKCKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KuchtaSSM17, author = {Veronika Kuchta and Gaurav Sharma and Rajeev Anand Sahu and Olivier Markowitch}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Generic Framework for Attribute-Based Group Signature}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {814--834}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_51}, doi = {10.1007/978-3-319-72359-4\_51}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KuchtaSSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiJWYF17, author = {Ye Li and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Jun{-}bin Fang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {525--538}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_31}, doi = {10.1007/978-3-319-72359-4\_31}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiJWYF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiLWZX17, author = {Yanling Li and Junzuo Lai and Chuansheng Wang and Jianghe Zhang and Jie Xiong}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Verifiable Range Query Processing for Cloud Computing}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {333--349}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_19}, doi = {10.1007/978-3-319-72359-4\_19}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LiLWZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiWLHQW17, author = {Na Li and Qianhong Wu and Jingwen Liu and Wei Hu and Bo Qin and Wei Wu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {EyeSec: {A} Practical Shoulder-Surfing Resistant Gaze-Based Authentication System}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {435--453}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_26}, doi = {10.1007/978-3-319-72359-4\_26}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LiWLHQW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiWTQWM17, author = {Yanan Li and Qianhong Wu and Wenyi Tang and Bo Qin and Qin Wang and Meixia Miao}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Outsourcing Encrypted Excel Files}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {506--524}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_30}, doi = {10.1007/978-3-319-72359-4\_30}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LiWTQWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiangM17, author = {Bei Liang and Aikaterini Mitrokotsa}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {422--431}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_25}, doi = {10.1007/978-3-319-72359-4\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LinHLWY17, author = {Cheng{-}Jun Lin and Xinyi Huang and Shitang Li and Wei Wu and Shao{-}Jun Yang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Linearly Homomorphic Signatures with Designated Entities}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {375--390}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_22}, doi = {10.1007/978-3-319-72359-4\_22}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LinHLWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuZYWWXL17, author = {Bo Liu and Wanlei Zhou and Shui Yu and Kun Wang and Yu Wang and Yong Xiang and Jin Li}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Home Location Protection in Mobile Social Networks: {A} Community Based Method (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {694--704}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_43}, doi = {10.1007/978-3-319-72359-4\_43}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LiuZYWWXL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LuoYWY17, author = {Song Luo and Lu Yan and Jian Weng and Zheng Yang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {New Proof for {BKP} {IBE} Scheme and Improvement in the {MIMC} Setting}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {136--155}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_8}, doi = {10.1007/978-3-319-72359-4\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LuoYWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LvPT17, author = {Bo Lv and Zhiniang Peng and Shaohua Tang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A Secure Variant of the {SRP} Encryption Scheme with Shorter Private Key}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {156--167}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_9}, doi = {10.1007/978-3-319-72359-4\_9}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LvPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MaSZM17, author = {Xinxin Ma and Jun Shao and Cong Zuo and Ru Meng}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Efficient Certificate-Based Signature and Its Aggregation}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {391--408}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_23}, doi = {10.1007/978-3-319-72359-4\_23}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/MaSZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MinagarSL17, author = {Sepehr Minagar and Balasubramaniam Srinivasan and Phu Dung Le}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A Formal Model for an Ideal {CFI}}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {707--726}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_44}, doi = {10.1007/978-3-319-72359-4\_44}, timestamp = {Thu, 01 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/MinagarSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MishraDY17, author = {Pradeep Kumar Mishra and Dung Hoang Duong and Masaya Yasuda}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {320--330}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_18}, doi = {10.1007/978-3-319-72359-4\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/MishraDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/RenCYW17, author = {Lu Ren and Rui Chang and Qing Yin and Wei Wang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Using the {B} Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {759--769}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_47}, doi = {10.1007/978-3-319-72359-4\_47}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/RenCYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SasakiY17, author = {Yu Sasaki and Kan Yasuda}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Optimizing Online Permutation-Based {AE} Schemes for Lightweight Applications}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {217--236}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_13}, doi = {10.1007/978-3-319-72359-4\_13}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/SasakiY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShenFLWJS17, author = {Jian Shen and Meng Feng and Dengzhi Liu and Chen Wang and Jiachen Jiang and Xingming Sun}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {454--467}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_27}, doi = {10.1007/978-3-319-72359-4\_27}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ShenFLWJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShenLSCLL17, author = {Xuan Shen and Ruilin Li and Bing Sun and Lei Cheng and Chao Li and Maodong Liao}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {237--255}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_14}, doi = {10.1007/978-3-319-72359-4\_14}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ShenLSCLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShenZ17, author = {Yanjun Shen and Peng Zhang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {350--360}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_20}, doi = {10.1007/978-3-319-72359-4\_20}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ShenZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShimizuS17, author = {Toshiya Shimizu and Takeshi Shimoyama}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {256--275}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_15}, doi = {10.1007/978-3-319-72359-4\_15}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ShimizuS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SimH17, author = {Bo{-}Yeon Sim and Dong{-}Guk Han}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Key Bit-Dependent Attack on Protected {PKC} Using a Single Trace}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {168--185}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_10}, doi = {10.1007/978-3-319-72359-4\_10}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/SimH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Sun0YX17, author = {Xiaoqiang Sun and Peng Zhang and Jianping Yu and Weixin Xie}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {835--846}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_52}, doi = {10.1007/978-3-319-72359-4\_52}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/Sun0YX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TangWWYY17, author = {Yong Tang and Yi Wang and Shuning Wei and Bo Yu and Qiang Yang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {770--779}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_48}, doi = {10.1007/978-3-319-72359-4\_48}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/TangWWYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TianHF17, author = {Haibo Tian and Jiejie He and Liqing Fu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Contract Coin: Toward Practical Contract Signing on Blockchain}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {43--61}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_3}, doi = {10.1007/978-3-319-72359-4\_3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TianHF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WagnerPMA17, author = {Thomas D. Wagner and Esther Palomar and Khaled Mahbub and Ali E. Abdallah}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {576--586}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_35}, doi = {10.1007/978-3-319-72359-4\_35}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WagnerPMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WanZEL17, author = {Jia Wan and Mohammad Zulkernine and Phil Eisen and Clifford Liem}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Defending Application Cache Integrity of Android Runtime}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {727--746}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_45}, doi = {10.1007/978-3-319-72359-4\_45}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WanZEL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangTWJ17, author = {Zhi Wang and Meiqi Tian and Junnan Wang and Chunfu Jia}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {747--758}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_46}, doi = {10.1007/978-3-319-72359-4\_46}, timestamp = {Wed, 25 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangTWJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WeiYYWWD17, author = {Zhuo Wei and Yanjiang Yang and Rehana Yasmin and Yongdong Wu and Jian Weng and Robert H. Deng}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {638--647}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_39}, doi = {10.1007/978-3-319-72359-4\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WeiYYWWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuWWX17, author = {Tingmin Wu and Derek Wang and Sheng Wen and Yang Xiang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {898--904}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_57}, doi = {10.1007/978-3-319-72359-4\_57}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WuWWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuC017, author = {Jia Xu and Ee{-}Chien Chang and Jianying Zhou}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A New Functional Encryption for Multidimensional Range Query (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {361--372}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_21}, doi = {10.1007/978-3-319-72359-4\_21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuC017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YangHYYZ17, author = {Haomiao Yang and Yunfan Huang and Yong Yu and Mingxuan Yao and Xiaosong Zhang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Privacy-Preserving Extraction of {HOG} Features Based on Integer Vector Homomorphic Encryption}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {102--117}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_6}, doi = {10.1007/978-3-319-72359-4\_6}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YangHYYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YangYCYNHZ17, author = {Xu Yang and Xun Yi and Hui Cui and Xuechao Yang and Surya Nepal and Xinyi Huang and YaLi Zeng}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A Practical Authentication Protocol for Anonymous Web Browsing}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {468--482}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_28}, doi = {10.1007/978-3-319-72359-4\_28}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YangYCYNHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YaoMY17, author = {Zhongyuan Yao and Yi Mu and Guomin Yang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Group-Based Source-Destination Verifiable Encryption with Blacklist Checking}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {186--203}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_11}, doi = {10.1007/978-3-319-72359-4\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/YaoMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YasudaSTAYY17, author = {Masaya Yasuda and Takeshi Shimoyama and Masahiko Takenaka and Narishige Abe and Shigefumi Yamada and Junpei Yamaguchi}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of {ACNS} 2015 and 2016}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {409--421}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_24}, doi = {10.1007/978-3-319-72359-4\_24}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/YasudaSTAYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangJCSH17, author = {Yidan Zhang and Marino Anthony James and Jiageng Chen and Chunhua Su and Jinguang Han}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {566--575}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_34}, doi = {10.1007/978-3-319-72359-4\_34}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangJCSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangWQHZCL17, author = {Wentao Zhang and Qianhong Wu and Bo Qin and Tianxu Han and Yanting Zhang and Xiaofeng Chen and Na Li}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {TTP-free Fair Exchange of Digital Signatures with Bitcoin}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {62--81}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_4}, doi = {10.1007/978-3-319-72359-4\_4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangWQHZCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2017, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4}, doi = {10.1007/978-3-319-72359-4}, isbn = {978-3-319-72358-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.