default search action
11th ISPEC 2015: Beijing, China
- Javier López, Yongdong Wu:
Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings. Lecture Notes in Computer Science 9065, Springer 2015, ISBN 978-3-319-17532-4
System Security
- Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng:
Operating System Security Policy Hardening via Capability Dependency Graphs. 3-17 - Chenglong Wei, Wenchang Shi, Bo Qin, Bin Liang:
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement. 18-32
Stream cipher I
- Riham AlTawy, Amr M. Youssef:
Differential Fault Analysis of Streebog. 35-49 - Shaoyu Du, Bin Zhang, Zhenqi Li, Dongdai Lin:
Fault Attacks on Stream Cipher Scream. 50-64 - Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Wei Zhao:
New Related Key Attacks on the RAKAPOSHI Stream Cipher. 65-75
Analysis
- Xiaochao Sun, Bao Li, Xianhui Lu:
Cramer-Shoup Like Chosen Ciphertext Security from LPN. 79-95 - Liqiang Peng, Lei Hu, Zhangjie Huang, Jun Xu:
Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant. 96-108 - Weixuan Li, Wei Yu, Kunpeng Wang:
Analysis of Fractional ωmbNAF for Scalar Multiplication. 109-120 - Fariba Haddadi, Duc Le Cong, Laura Porter, Nur Zincir-Heywood:
On the Effectiveness of Different Botnet Detection Approaches. 121-135
Key Exchange Protocol
- Baoping Tian, Fushan Wei, Chuangui Ma:
Strongly Secure Key Exchange Protocol with Minimal KEM. 139-153 - Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices. 154-167
Elliptic Curve Cryptography
- Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Models of Curves from GHS Attack in Odd Characteristic. 171-180 - Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves. 181-191 - Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu:
Batch Blind Signatures on Elliptic Curves. 192-206
Stream cipher II
- Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:
Improved Differential Analysis of Block Cipher PRIDE. 209-219 - Chun Guo, Hailong Zhang, Dongdai Lin:
Estimating Differential-Linear Distinguishers and Applications to CTC2. 220-234 - Shaoyu Du, Zhenqi Li, Bin Zhang, Dongdai Lin:
Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI. 235-249
Authentication
- Erick Bauman, Yafeng Lu, Zhiqiang Lin:
Half a Century of Practice: Who Is Still Storing Plaintext Passwords? 253-267 - Michael Velten, Peter Schneider, Sascha Wessel, Claudia Eckert:
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. 268-282 - Shantian Cheng, Juanyang Zhang:
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. 283-297
Attribute-based Encryption
- Yutaka Kawai:
Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption. 301-315 - Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu:
Revocable Threshold Attribute-Based Signature against Signing Key Exposure. 316-330 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Online/Offline Predicate and Attribute-Based Encryption. 331-345
Mobile Security
- Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng:
A Rapid and Scalable Method for Android Application Repackaging Detection. 349-364 - Craig Sanders, Ayush Shah, Shengzhi Zhang:
Comprehensive Analysis of the Android Google Play's Auto-update Policy. 365-377 - Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang:
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication. 378-392
Theory
- Dibyendu Roy, Ankita Chaturvedi, Sourav Mukhopadhyay:
New Constructions of T-function. 395-405 - Qingbin Wang, Shaozhen Chen, Aijun Ge:
A New Lattice-Based Threshold Attribute-Based Signature Scheme. 406-420 - Lucjan Hanzlik, Miroslaw Kutylowski, Moti Yung:
Hard Invalidation of Electronic Signatures. 421-436
Implementation
- Wei Zhang, Yu Zhang:
Lightweight Function Pointer Analysis. 439-453 - Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen:
Accelerating RSA with Fine-Grained Parallelism Using GPU. 454-468 - Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng:
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes. 469-484 - Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, Lei Zhang:
Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records. 485-498 - Clémentine Gritti, Willy Susilo, Thomas Plantard:
Efficient File Sharing in Electronic Health Records. 499-513 - Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini:
A Framework for Analyzing Verifiability in Traditional and Electronic Exams. 514-529
Privay & Indistinguishability
- Liang Cheng, Shaoyin Cheng, Fan Jiang:
ADKAM: A-Diversity K-Anonymity Model via Microaggregation. 533-547 - Jina Kang, Hyoungshick Kim, Yun-Gyung Cheong, Jun Ho Huh:
Visualizing Privacy Risks of Mobile Applications through a Privacy Meter. 548-558 - Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, Fei Tang:
One-Round Witness Indistinguishability from Indistinguishability Obfuscation. 559-574
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.