Search dblp for Publications

export results for "toc:db/conf/ispec/ispec2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ispec/AlavizadehADKJG17,
  author       = {Hooman Alavizadeh and
                  Hootan Alavizadeh and
                  Kudakwashe Dube and
                  Dong Seong Kim and
                  Julian Jang{-}Jaccard and
                  Hans W. Guesgen},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile
                  Devices},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {860--876},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_54},
  doi          = {10.1007/978-3-319-72359-4\_54},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/AlavizadehADKJG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/AlavizadehKHJ17,
  author       = {Hooman Alavizadeh and
                  Dong Seong Kim and
                  Jin B. Hong and
                  Julian Jang{-}Jaccard},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Effective Security Analysis for Combinations of {MTD} Techniques on
                  Cloud Computing (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {539--548},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_32},
  doi          = {10.1007/978-3-319-72359-4\_32},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/AlavizadehKHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CaiLRL17,
  author       = {Jun Cai and
                  Jian{-}Zhen Luo and
                  Jianliang Ruan and
                  Yan Liu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Toward Fuzz Test Based on Protocol Reverse Engineering},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {892--897},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_56},
  doi          = {10.1007/978-3-319-72359-4\_56},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/CaiLRL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChangDX17,
  author       = {Jinyong Chang and
                  Honglong Dai and
                  Maozhi Xu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {The {KDM-CCA} Security of {REACT}},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {85--101},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_5},
  doi          = {10.1007/978-3-319-72359-4\_5},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ChangDX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChenLWCLLAZ17,
  author       = {Ting Chen and
                  Xiaoqi Li and
                  Ying Wang and
                  Jiachi Chen and
                  Zihao Li and
                  Xiapu Luo and
                  Man Ho Au and
                  Xiaosong Zhang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced
                  DoS Attacks},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_1},
  doi          = {10.1007/978-3-319-72359-4\_1},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ChenLWCLLAZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChengWZ17,
  author       = {Leixiao Cheng and
                  Quanshui Wu and
                  Yunlei Zhao},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Compact Lossy and All-but-One Trapdoor Functions from Lattice},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {279--296},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_16},
  doi          = {10.1007/978-3-319-72359-4\_16},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ChengWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChiangWFCWK17,
  author       = {Mei{-}Ling Chiang and
                  Jian{-}Kai Wang and
                  Li{-}Chi Feng and
                  Yang{-}Sen Chen and
                  You{-}Chi Wang and
                  Wen{-}Yu Kao},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Design and Implementation of a Lightweight Kernel-Level Network Intrusion
                  Prevention System for Virtualized Environment (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {587--598},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_36},
  doi          = {10.1007/978-3-319-72359-4\_36},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ChiangWFCWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChowSB17,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Covert {QR} Codes: How to Hide in the Crowd},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {678--693},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_42},
  doi          = {10.1007/978-3-319-72359-4\_42},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ChowSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CreadoL17,
  author       = {Orhio Mark Creado and
                  Phu Dung Le},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Enforcing Security in Artificially Intelligent Robots Using Monitors
                  (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {648--659},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_40},
  doi          = {10.1007/978-3-319-72359-4\_40},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/CreadoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/DaiCHX17,
  author       = {Honglong Dai and
                  Jinyong Chang and
                  Zhenduo Hou and
                  Maozhi Xu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {The {ECCA} Security of Hybrid Encryptions},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {847--859},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_53},
  doi          = {10.1007/978-3-319-72359-4\_53},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/DaiCHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Datta17,
  author       = {Pratish Datta},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Compact Attribute-Based and Online-Offline Multi-input Inner Product
                  Encryptions from Standard Static Assumptions (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {204--214},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_12},
  doi          = {10.1007/978-3-319-72359-4\_12},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/Datta17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/DinhSB17,
  author       = {Trung Dinh and
                  Ron Steinfeld and
                  Nandita Bhattacharjee},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A Lattice-Based Approach to Privacy-Preserving Biometric Authentication
                  Without Relying on Trusted Third Parties},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {297--319},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_17},
  doi          = {10.1007/978-3-319-72359-4\_17},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/DinhSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GaoLDLSL17,
  author       = {Xinwei Gao and
                  Lin Li and
                  Jintai Ding and
                  Jiqiang Liu and
                  R. V. Saraswathy and
                  Zhe Liu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Fast Discretized Gaussian Sampling and Post-quantum {TLS} Ciphersuite},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {551--565},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_33},
  doi          = {10.1007/978-3-319-72359-4\_33},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/GaoLDLSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GrittiCSP17,
  author       = {Cl{\'{e}}mentine Gritti and
                  Rongmao Chen and
                  Willy Susilo and
                  Thomas Plantard},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Dynamic Provable Data Possession Protocols with Public Verifiability
                  and Data Privacy},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {485--505},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_29},
  doi          = {10.1007/978-3-319-72359-4\_29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GrittiCSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HanLX17,
  author       = {Xuan Han and
                  Yamin Liu and
                  Haixia Xu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A User-Friendly Centrally Banked Cryptocurrency},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {25--42},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_2},
  doi          = {10.1007/978-3-319-72359-4\_2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HanLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HeLYWL17,
  author       = {Kai He and
                  Xueqiao Liu and
                  Huaqiang Yuan and
                  Wenhong Wei and
                  Kaitai Liang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Hierarchical Conditional Proxy Re-Encryption: {A} New Insight of Fine-Grained
                  Secure Data Sharing},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {118--135},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_7},
  doi          = {10.1007/978-3-319-72359-4\_7},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HeLYWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HeWLHQL17,
  author       = {Shuangyu He and
                  Qianhong Wu and
                  Jingwen Liu and
                  Wei Hu and
                  Bo Qin and
                  Yanan Li},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Secure Communications in Unmanned Aerial Vehicle Network},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {601--620},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_37},
  doi          = {10.1007/978-3-319-72359-4\_37},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/HeWLHQL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HuangZWC17,
  author       = {Tianxiang Huang and
                  Jianying Zhou and
                  Yi Wang and
                  Anyu Cheng},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {On the Security of In-Vehicle Hybrid Network: Status and Challenges},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {621--637},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_38},
  doi          = {10.1007/978-3-319-72359-4\_38},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/HuangZWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Hunter17,
  author       = {Aaron Hunter},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Reasoning About Trust and Belief Change on a Social Network: {A} Formal
                  Approach},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {783--801},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_49},
  doi          = {10.1007/978-3-319-72359-4\_49},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Hunter17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JiangCRDJY17,
  author       = {Hang Jiang and
                  Rui Chang and
                  Lu Ren and
                  Weiyu Dong and
                  Liehui Jiang and
                  Shuiqiao Yang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {An Effective Authentication for Client Application Using {ARM} TrustZone},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {802--813},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_50},
  doi          = {10.1007/978-3-319-72359-4\_50},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/JiangCRDJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KagaFNTMON17,
  author       = {Yosuke Kaga and
                  Masakazu Fujio and
                  Ken Naganuma and
                  Kenta Takahashi and
                  Takao Murakami and
                  Tetsushi Ohki and
                  Masakatsu Nishigaki},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A Secure and Practical Signature Scheme for Blockchain Based on Biometrics},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {877--891},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_55},
  doi          = {10.1007/978-3-319-72359-4\_55},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KagaFNTMON17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KimKCKS17,
  author       = {Jinwoo Kim and
                  Kuyju Kim and
                  Junsung Cho and
                  Hyoungshick Kim and
                  Sebastian Schrittwieser},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis
                  of Enumeration Attack Using Phone Numbers on Facebook},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {663--677},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_41},
  doi          = {10.1007/978-3-319-72359-4\_41},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/KimKCKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KuchtaSSM17,
  author       = {Veronika Kuchta and
                  Gaurav Sharma and
                  Rajeev Anand Sahu and
                  Olivier Markowitch},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Generic Framework for Attribute-Based Group Signature},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {814--834},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_51},
  doi          = {10.1007/978-3-319-72359-4\_51},
  timestamp    = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KuchtaSSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiJWYF17,
  author       = {Ye Li and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Jun{-}bin Fang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Outsourced Privacy-Preserving Random Decision Tree Algorithm Under
                  Multiple Parties for Sensor-Cloud Integration},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {525--538},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_31},
  doi          = {10.1007/978-3-319-72359-4\_31},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiJWYF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiLWZX17,
  author       = {Yanling Li and
                  Junzuo Lai and
                  Chuansheng Wang and
                  Jianghe Zhang and
                  Jie Xiong},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Verifiable Range Query Processing for Cloud Computing},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {333--349},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_19},
  doi          = {10.1007/978-3-319-72359-4\_19},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LiLWZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiWLHQW17,
  author       = {Na Li and
                  Qianhong Wu and
                  Jingwen Liu and
                  Wei Hu and
                  Bo Qin and
                  Wei Wu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {EyeSec: {A} Practical Shoulder-Surfing Resistant Gaze-Based Authentication
                  System},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {435--453},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_26},
  doi          = {10.1007/978-3-319-72359-4\_26},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LiWLHQW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiWTQWM17,
  author       = {Yanan Li and
                  Qianhong Wu and
                  Wenyi Tang and
                  Bo Qin and
                  Qin Wang and
                  Meixia Miao},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Outsourcing Encrypted Excel Files},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {506--524},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_30},
  doi          = {10.1007/978-3-319-72359-4\_30},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LiWTQWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiangM17,
  author       = {Bei Liang and
                  Aikaterini Mitrokotsa},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Fast and Adaptively Secure Signatures in the Random Oracle Model from
                  Indistinguishability Obfuscation (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {422--431},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_25},
  doi          = {10.1007/978-3-319-72359-4\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiangM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LinHLWY17,
  author       = {Cheng{-}Jun Lin and
                  Xinyi Huang and
                  Shitang Li and
                  Wei Wu and
                  Shao{-}Jun Yang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Linearly Homomorphic Signatures with Designated Entities},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {375--390},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_22},
  doi          = {10.1007/978-3-319-72359-4\_22},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LinHLWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiuZYWWXL17,
  author       = {Bo Liu and
                  Wanlei Zhou and
                  Shui Yu and
                  Kun Wang and
                  Yu Wang and
                  Yong Xiang and
                  Jin Li},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Home Location Protection in Mobile Social Networks: {A} Community
                  Based Method (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {694--704},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_43},
  doi          = {10.1007/978-3-319-72359-4\_43},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LiuZYWWXL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LuoYWY17,
  author       = {Song Luo and
                  Lu Yan and
                  Jian Weng and
                  Zheng Yang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {New Proof for {BKP} {IBE} Scheme and Improvement in the {MIMC} Setting},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {136--155},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_8},
  doi          = {10.1007/978-3-319-72359-4\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LuoYWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LvPT17,
  author       = {Bo Lv and
                  Zhiniang Peng and
                  Shaohua Tang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A Secure Variant of the {SRP} Encryption Scheme with Shorter Private
                  Key},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_9},
  doi          = {10.1007/978-3-319-72359-4\_9},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LvPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MaSZM17,
  author       = {Xinxin Ma and
                  Jun Shao and
                  Cong Zuo and
                  Ru Meng},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Efficient Certificate-Based Signature and Its Aggregation},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {391--408},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_23},
  doi          = {10.1007/978-3-319-72359-4\_23},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/MaSZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MinagarSL17,
  author       = {Sepehr Minagar and
                  Balasubramaniam Srinivasan and
                  Phu Dung Le},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A Formal Model for an Ideal {CFI}},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {707--726},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_44},
  doi          = {10.1007/978-3-319-72359-4\_44},
  timestamp    = {Thu, 01 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/MinagarSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MishraDY17,
  author       = {Pradeep Kumar Mishra and
                  Dung Hoang Duong and
                  Masaya Yasuda},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE
                  Homomorphic Encryption},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {320--330},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_18},
  doi          = {10.1007/978-3-319-72359-4\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/MishraDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/RenCYW17,
  author       = {Lu Ren and
                  Rui Chang and
                  Qing Yin and
                  Wei Wang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Using the {B} Method to Formalize Access Control Mechanism with TrustZone
                  Hardware Isolation (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {759--769},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_47},
  doi          = {10.1007/978-3-319-72359-4\_47},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/RenCYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SasakiY17,
  author       = {Yu Sasaki and
                  Kan Yasuda},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Optimizing Online Permutation-Based {AE} Schemes for Lightweight Applications},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {217--236},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_13},
  doi          = {10.1007/978-3-319-72359-4\_13},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/SasakiY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShenFLWJS17,
  author       = {Jian Shen and
                  Meng Feng and
                  Dengzhi Liu and
                  Chen Wang and
                  Jiachen Jiang and
                  Xingming Sun},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Enhanced Remote Password-Authenticated Key Agreement Based on Smart
                  Card Supporting Password Changing},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {454--467},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_27},
  doi          = {10.1007/978-3-319-72359-4\_27},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ShenFLWJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShenLSCLL17,
  author       = {Xuan Shen and
                  Ruilin Li and
                  Bing Sun and
                  Lei Cheng and
                  Chao Li and
                  Maodong Liao},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Dual Relationship Between Impossible Differentials and Zero Correlation
                  Linear Hulls of SIMON-Like Ciphers},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {237--255},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_14},
  doi          = {10.1007/978-3-319-72359-4\_14},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ShenLSCLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShenZ17,
  author       = {Yanjun Shen and
                  Peng Zhang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {350--360},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_20},
  doi          = {10.1007/978-3-319-72359-4\_20},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ShenZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShimizuS17,
  author       = {Toshiya Shimizu and
                  Takeshi Shimoyama},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Block Cipher Modes of Operation for Heterogeneous Format Preserving
                  Encryption},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {256--275},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_15},
  doi          = {10.1007/978-3-319-72359-4\_15},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ShimizuS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SimH17,
  author       = {Bo{-}Yeon Sim and
                  Dong{-}Guk Han},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Key Bit-Dependent Attack on Protected {PKC} Using a Single Trace},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {168--185},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_10},
  doi          = {10.1007/978-3-319-72359-4\_10},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/SimH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Sun0YX17,
  author       = {Xiaoqiang Sun and
                  Peng Zhang and
                  Jianping Yu and
                  Weixin Xie},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {835--846},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_52},
  doi          = {10.1007/978-3-319-72359-4\_52},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/Sun0YX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TangWWYY17,
  author       = {Yong Tang and
                  Yi Wang and
                  Shuning Wei and
                  Bo Yu and
                  Qiang Yang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Matching Function-Call Graph of Binary Codes and Its Applications
                  (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {770--779},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_48},
  doi          = {10.1007/978-3-319-72359-4\_48},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/TangWWYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TianHF17,
  author       = {Haibo Tian and
                  Jiejie He and
                  Liqing Fu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Contract Coin: Toward Practical Contract Signing on Blockchain},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {43--61},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_3},
  doi          = {10.1007/978-3-319-72359-4\_3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TianHF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WagnerPMA17,
  author       = {Thomas D. Wagner and
                  Esther Palomar and
                  Khaled Mahbub and
                  Ali E. Abdallah},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {576--586},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_35},
  doi          = {10.1007/978-3-319-72359-4\_35},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WagnerPMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WanZEL17,
  author       = {Jia Wan and
                  Mohammad Zulkernine and
                  Phil Eisen and
                  Clifford Liem},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Defending Application Cache Integrity of Android Runtime},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {727--746},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_45},
  doi          = {10.1007/978-3-319-72359-4\_45},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WanZEL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangTWJ17,
  author       = {Zhi Wang and
                  Meiqi Tian and
                  Junnan Wang and
                  Chunfu Jia},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {An Ensemble Learning System to Mitigate Malware Concept Drift Attacks
                  (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {747--758},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_46},
  doi          = {10.1007/978-3-319-72359-4\_46},
  timestamp    = {Wed, 25 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangTWJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WeiYYWWD17,
  author       = {Zhuo Wei and
                  Yanjiang Yang and
                  Rehana Yasmin and
                  Yongdong Wu and
                  Jian Weng and
                  Robert H. Deng},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving
                  (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {638--647},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_39},
  doi          = {10.1007/978-3-319-72359-4\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WeiYYWWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WuWWX17,
  author       = {Tingmin Wu and
                  Derek Wang and
                  Sheng Wen and
                  Yang Xiang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {How Spam Features Change in Twitter and the Impact to Machine Learning
                  Based Detection},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {898--904},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_57},
  doi          = {10.1007/978-3-319-72359-4\_57},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WuWWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuC017,
  author       = {Jia Xu and
                  Ee{-}Chien Chang and
                  Jianying Zhou},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A New Functional Encryption for Multidimensional Range Query (Short
                  Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {361--372},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_21},
  doi          = {10.1007/978-3-319-72359-4\_21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuC017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YangHYYZ17,
  author       = {Haomiao Yang and
                  Yunfan Huang and
                  Yong Yu and
                  Mingxuan Yao and
                  Xiaosong Zhang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Privacy-Preserving Extraction of {HOG} Features Based on Integer Vector
                  Homomorphic Encryption},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {102--117},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_6},
  doi          = {10.1007/978-3-319-72359-4\_6},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YangHYYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YangYCYNHZ17,
  author       = {Xu Yang and
                  Xun Yi and
                  Hui Cui and
                  Xuechao Yang and
                  Surya Nepal and
                  Xinyi Huang and
                  YaLi Zeng},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A Practical Authentication Protocol for Anonymous Web Browsing},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {468--482},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_28},
  doi          = {10.1007/978-3-319-72359-4\_28},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YangYCYNHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YaoMY17,
  author       = {Zhongyuan Yao and
                  Yi Mu and
                  Guomin Yang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Group-Based Source-Destination Verifiable Encryption with Blacklist
                  Checking},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {186--203},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_11},
  doi          = {10.1007/978-3-319-72359-4\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/YaoMY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YasudaSTAYY17,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Masahiko Takenaka and
                  Narishige Abe and
                  Shigefumi Yamada and
                  Junpei Yamaguchi},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes
                  of {ACNS} 2015 and 2016},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {409--421},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_24},
  doi          = {10.1007/978-3-319-72359-4\_24},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/YasudaSTAYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangJCSH17,
  author       = {Yidan Zhang and
                  Marino Anthony James and
                  Jiageng Chen and
                  Chunhua Su and
                  Jinguang Han},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Automatic Encryption Schemes Based on the Neural Networks: Analysis
                  and Discussions on the Various Adversarial Models (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {566--575},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_34},
  doi          = {10.1007/978-3-319-72359-4\_34},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangJCSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangWQHZCL17,
  author       = {Wentao Zhang and
                  Qianhong Wu and
                  Bo Qin and
                  Tianxu Han and
                  Yanting Zhang and
                  Xiaofeng Chen and
                  Na Li},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {TTP-free Fair Exchange of Digital Signatures with Bitcoin},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {62--81},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_4},
  doi          = {10.1007/978-3-319-72359-4\_4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangWQHZCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2017,
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4},
  doi          = {10.1007/978-3-319-72359-4},
  isbn         = {978-3-319-72358-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics