default search action
11th AsiaJCIS 2016: Fukuoka, Japan
- 11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-2285-4
IoT Security
- Ezedin Barka, Nedaa Al Hussien, Khaled Shuaib:
Securing Smart Meters Data for AMI Using RBAC. 1-8 - Bilhanan Silverajan, Markku Vajaranta, Antti Kolehmainen:
Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers. 9-16 - Markku Vajaranta, Joona Kannisto, Jarmo Harju:
Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlays. 17-23
Privacy and Anonymity
- Shang-Wen Chen, Raylin Tso:
NFC-based Mobile Payment Protocol with User Anonymity. 24-30 - Thomas Vannet, Noboru Kunihiro:
Partial Server Side Parameter Selection in Private Information Retrieval. 31-38 - Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai:
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing. 39-47 - Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui, Chun-I Fan:
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares. 48-54
Honeypot
- Juha Nurmi, Joona Kannisto, Markku Vajaranta:
Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet. 55-59 - Satomi Saito, Satoru Torii, Katsunari Yoshioka, Tsutomu Matsumoto:
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots. 60-66 - Jinhak Park, Jang Won Choi, Jung-suk Song:
How to Design Practical Client Honeypots Based on Virtual Environment. 67-73
Network-Based Attack Detection
- Chia-Mei Chen, Gu Hsin Lai, Pong-Yu Young:
Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection. 74-79 - Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation. 80-86 - Bayu Adhi Tama, Kyung Hyune Rhee:
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network. 87-91 - Jia-Rung Yeh, Hsu-Chun Hsiao, Ai-Chun Pang:
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes. 92-99 - Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei, Nen-Fu Huang:
SDNort: A Software Defined Network Testing Framework Using Openflow. 100-107
Cryptography and Data Security
- Koji Shima, Hiroshi Doi:
({1, 3}, n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants. 108-114 - Yuhei Watanabe, Yosuke Todo, Masakatu Morii:
New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1. 115-123 - Chih-Hung Wang, Chien-Ming Wang:
Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment. 130-135 - Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, Yu-Chih Huang:
An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method. 136-140
Fighting Malware
- Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM. 141-146 - Mamoru Mimura, Yuhei Otsubo, Hidehiko Tanaka:
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File. 147-154 - Ryoichi Isawa, Masakatu Morii, Daisuke Inoue:
Comparing Malware Samples for Unpacking: A Feasibility Study. 155-160
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.