default search action
ICCSP 2019: Kuala Lumpur, Malaysia
- Yulin Wang, Chin-Chen Chang:
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019. ACM 2019, ISBN 978-1-4503-6618-2
Blockchain and encryption technology
- Yu Xiong, Jiang Du:
Electronic evidence preservation model based on blockchain. 1-5 - Ranbir Singh Bali, Fehmi Jaafar, Pavol Zavarsky:
Lightweight authentication for MQTT to improve the security of IoT communication. 6-12 - Sihua Wu, Jiang Du:
Electronic medical record security sharing model based on blockchain. 13-17 - Aman Shakya
, Nitesh Karna:
Enhancing MD5 hash algorithm using symmetric key encryption. 18-22 - Mohammed M. Alani
:
Applications of machine learning in cryptography: a survey. 23-27 - Yihan Jiang, Yong Li, Yan Zhu
:
Auditable zerocoin scheme with user awareness. 28-32 - Rommel Evan J. Paje, Ariel M. Sison, Ruji P. Medina
:
Multidimensional key RC6 algorithm. 33-38 - Ziaeddin Nazari, Morteza Noferesti, Rasool Jalili:
DSCA: an inline and adaptive application identification approach in encrypted network traffic. 39-43 - Enrique G. Abad, Ariel M. Sison:
Enhanced key generation algorithm of hashing message authentication code. 44-48 - Widya Wirachantika, Ari Moesriami Barmawi, Bambang Ari Wahyudi
:
Strengthening fawkescoin against double spending attack using merkle tree. 49-54 - Jerome P. Songcuan, Ariel M. Sison:
Jumbled passsteps: a hotspot guessing attack resistant graphical password authentication scheme based on the modified passmatrix method. 55-59 - Parameshachari Bidare Divakarachari, Kiran
, Rashmi P
, Supriya M. C, Rajashekarappa, Panduranga H. T:
Controlled partial image encryption based on LSIC and chaotic map. 60-63 - Daniel A. Neri
, Ruji P. Medina
, Ariel M. Sison:
An XBOX-based key generation technique for vigenere algorithm. 66-70
Data processing and data security
- Julia Ostheimer, Sarfraz Iqbal
:
Privacy in online dating: does it matter? 71-75 - Ha Xuan Son, Nguyen Minh Hoang:
A novel attribute-based access control system for fine-grained privacy protection. 76-80 - Jacob Leon Kröger
, Philip Raschke, Towhidur Rahman Bhuiyan:
Privacy implications of accelerometer data: a review of possible inferences. 81-87 - DaYong Wu, Kien Tsong Chau
, Jingyi Wang, ChuTing Pan:
A comparative study on performance of XML parser APIs (DOM and SAX) in parsing efficiency. 88-92 - G. Manjula
, M. Shivakumar, Y. V. Geetha:
Adaptive optimization based neural network for classification of stuttered speech. 93-98 - Yan Zhang, Kien Tsong Chau
, Jingfang Xu, CuiTing Liu:
An investigation into the attractiveness level of commercial website for visitors: a case study on 66rpg website. 99-102
Network and information security
- Ying Yang, Zheng Song:
LBACWeb: a lattice-based access control model for mobile thin client based on web OSes. 103-109 - Hussain Aldawood
, Geoffrey Skinner
:
An academic review of current industrial and commercial cyber security social engineering solutions. 110-115 - Nguyen Minh Hoang, Ha Xuan Son:
A dynamic solution for fine-grained policy conflict resolution. 116-120 - Fang Miao, Wenjie Fan, Wenhui Yang, Yan Xie:
The study of data-oriented and ownership-based security architecture in open internet environment. 121-129 - Renato Rojas, Ana Muedas, David Mauricio
:
Security maturity model of web applications for cyber attacks. 130-137 - Wenchuan Yang, Zishuai Cheng
, Baojiang Cui:
Recombining TCP sessions based on finite state machine to detect cyber attackers. 138-142 - Muhammad Mudassar Yamin, Basel Katt:
Mobile device management (MDM) technologies, issues and challenges. 143-147 - Shuangxi Chen, Xiahui Xu, Chunming Wu, Xinyue Jiang:
Research on executive control strategy of mimic web defense gateway. 148-152 - Nurul Nadia Che Saufi, Nur Shuhadah Mohd Ab Razak, Hafizah Mansor:
"FoRent: vehicle forensics for car rental system". 153-157 - Dara Sinclair, Hossain Shahriar
, Chi Zhang:
Security requirement prototyping with hyperledger composer for drug supply chain: a blockchain application. 158-163
Target detection and pattern recognition
- Dyala R. Ibrahim
, Rosni Abdullah, Je Sen Teh
, Bisan Alsalibi:
Authentication for ID cards based on colour visual cryptography and facial recognition. 164-167 - Kavindu Dodanduwa, Ishara Kaluthanthri:
Trust-based identity sharing for token grants. 168-173 - Danlami Muktar
, Sapiee Jamel
, Sofia Najwa Ramli, Mustafa Mat Deris:
2D legendre wavelet filter for iris recognition feature extraction. 174-178 - Xiyu Wang, Heng-Jian Li, Jian Qiu, Changzhi Yu:
Palm vein recognition based on competitive code and DPL. 179-183 - Suhail Hamdan, Yohei Fukumizu, Tomonori Izumi, Hironori Yamauchi:
Improved face image super-resolution with restricted patch-searching area. 184-190 - Suriani Ab Rahman, Marcella Peter, Jacey-Lynn Minoi, Hamimah Ujir
:
Multiway analysis for face recognition. 191-195 - Golam Shams Rabbani, Sharmin Sultana, Md. Nazmul Hasan, Salem Quddus Fahad, Jia Uddin
:
Person identification using SURF features of dental radiograph. 196-200 - Mark Jeremy G. Narag
, Maricor N. Soriano:
Identifying the painter using texture features and machine learning algorithms. 201-205
Image processing and application
- Mas Rina Mustaffa, Goh Sweet Wai, Lili Nurliyana Abdullah
, Nurul Amelina Nasharuddin
:
Dress me up!: content-based clothing image retrieval. 206-210 - Ch. Rupa
, C. Devi:
Privacy and protection of medical images ROI using SPLSB and bit-plane based watermarking. 211-215 - Yi Xie, Wenjia Ding, Yulin Wang:
Detection and localization of image tamper with scalable granularity. 216-219 - S. M. Nazia Fathima, Tamilselvi Rajendran
, M. Parisa Beham
:
Estimation of t-score and BMD values from X-ray images for detection of osteoporosis. 220-224 - Ferdousi Rahman, Israt Jahan Ritun, Nafisa Farhin, Jia Uddin
:
An assistive model for visually impaired people using YOLO and MTCNN. 225-230 - Xuesong Lu, Xiangan Chen, Wei Li, Yuchuan Qiao
:
Graph cut segmentation of the right ventricle in cardiac MRI using multi-scale feature learning. 231-235 - Anan Nugroho
, Risanuri Hidayat
, Hanung Adi Nugroho
:
Artifact removal in radiological ultrasound images using selective and adaptive median filter. 237-241 - Yunyun Yang, Wenjing Jia, Dongcai Tian:
Improved active contour model for multi-phase MR image segmentation and bias field correction. 242-246 - En Chen, Tzren-Ru Chou:
Spectral reflectance recovery of various materials based on linear interpolation with nonparametric metameric spectra of extreme points. 247-255 - Weichen Lu, Anyong Qing, Ching Kwang Lee:
Single image super-resolution using fast sensing block. 256-260 - Zhen Li, Di Xu, Yanning Zhang:
Real walking on a virtual campus: a VR-based multimedia visualization and interaction system. 261-266 - Salsabil Ahmed, Raisa Islam, Sadman Shawmik Himalay, Jia Uddin
:
Preserving heritage sites using 3D modeling and virtual reality technology. 267-272 - Chia-Yu Huang, Hahn-Ming Lee, Jiunn-Chin Wang, Ching-Hao Mao:
Identifying HID-based attacks through process event graph using guilt-by-association analysis. 273-278 - Venkatesh
, Ananda Kumar Subramanian
:
Dead-end free geographic routing protocol for WSN. 279-283 - YouXuan Li, Kien Tsong Chau
, ZiHan Wei, QiBin Kang:
A comparative study on two XML editors (oxygon and ultraedit). 284-287 - Shiny Rajendrakumar, V. K. Parvati, Rajashekarappa, Parameshachari Bidare Divakarachari:
Automation of irrigation system through embedded computing technology. 289-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.