default search action
10th AsiaJCIS 2015: Kaohsiung City, Taiwan
- 10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-1989-5
Anonymity and Privacy
- Wen-Chung Kuo, Hong-Ji Wei, Yu-Hui Chen, Jiin-Chiou Cheng:
An Enhanced Secure Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments. 1-5 - Tomoaki Kosugi, Tomoki Hayafuji, Masahiro Mambo:
On the Traceability of the Accountable Anonymous Channel. 6-11 - Chien-Lung Hsu, Tzu-Wei Lin:
Privacy-Preserved Key Agreement with User Authentication. 12-17
Data Security
- Chun-I Fan, Shi-Yuan Huang, Wen-Che Hsu:
Encrypted Data Deduplication in Cloud Storage. 18-25 - Chun-I Fan, Chien-Nan Wu, Chun-Hung Chen, Yi-Fan Tseng, Cheng-Chun Feng:
Attribute-Based Proxy Re-encryption with Dynamic Membership. 26-32 - Chen-Ming Hsu, Jen-Chun Lee, Wei-Kuei Chen:
An Efficient Detection Algorithm for Copy-Move Forgery. 33-36
Mobile and Wireless Security
- Chia-Mei Chen, Tien-Ho Chang:
The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method. 37-41 - Hung-Yu Chien:
De-synchronization Attack on Quadratic Residues-Based RFID Ownership Transfer. 42-47 - Nai-Wei Lo, Chi-Kai Yu, Chao Yang Hsu:
Intelligent Display Auto-Lock Scheme for Mobile Devices. 48-54 - Nai-Wei Lo, Meng-Chih Chiang, Chao Yang Hsu:
Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks. 55-62 - Jonghyun Baek, Heung Youl Youm:
Secure and Lightweight Authentication Protocol for NFC Tag Based Services. 63-68
Privacy Preserving Analysis
- He-Ming Ruan, Ming-Hwa Tsai, Yennun Huang, Yen-Hua Liao, Chin-Laung Lei:
Discovery of De-identification Policies Considering Re-identification Risks and Information Loss. 69-76 - Yu Liu, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation. 77-84 - Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga:
Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals. 85-90
Secure Payment
- Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments. 91-96 - Chih Hung Wang, Hsiao Chien Sung:
Delegation-Based Roaming Payment Protocol with Location and Purchasing Privacy Protection. 97-103 - Chin-Chen Chang, Iuon-Chang Lin, Yi-Lun Chi:
Secure Electronic Coupons. 104-109
Symmetric Key Encryption and Digital Signature
- Hakju Kim, Kwangjo Kim:
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function. 110-111 - Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Constructions of Fail-Stop Signatures for Multi-signer Setting. 112-123 - Pei-Yih Ting, Shao-Da Huang, Tzong-Sun Wu, Han-Yu Lin:
A Provable Watermark-Based Copyright Protection Scheme. 124-129
System Security
- Chih-Hung Hsieh, Yu-Siang Shen, Chao-Wen Li, Jain-Shing Wu:
iF2: An Interpretable Fuzzy Rule Filter for Web Log Post-Compromised Malicious Activity Monitoring. 130-137 - Naoto Kawaguchi, Kazumasa Omote:
Malware Function Classification Using APIs in Initial Behavior. 138-144 - Takashi Adachi, Kazumasa Omote:
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode. 145-151 - Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding. 152-159
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.