default search action
15th ISPEC 2019: Kuala Lumpur, Malaysia
- Swee-Huay Heng, Javier López:
Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings. Lecture Notes in Computer Science 11879, Springer 2019, ISBN 978-3-030-34338-5
Cryptography I
- Sha Ma, Qiong Huang:
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model. 3-19 - Joon Soo Yoo, Jeong-Hwan Hwang, Baek Kyung Song, Ji Won Yoon:
A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme. 20-40 - Wai-Kong Lee, Sedat Akleylek, Wun-She Yap, Bok-Min Goi:
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme. 41-55 - Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You:
Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE. 56-72
System and Network Security
- Hiroki Kuzuno, Toshihiro Yamauchi:
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism. 75-94 - Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli, Leonardo Querzoni:
Peel the Onion: Recognition of Android Apps Behind the Tor Network. 95-112 - Sherif Saad, Farhan Mahmood, William Briguglio, Haytham Elmiligi:
JSLess: A Tale of a Fileless Javascript Memory-Resident Malware. 113-131
Security Protocol and Tool
- Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone:
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation. 135-151 - Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure Best Arm Identification in Multi-armed Bandits. 152-171 - Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat:
CATCHA: When Cats Track Your Movements Online. 172-193 - Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, Isabelle Borne:
Designing a Code Vulnerability Meta-scanner. 194-210
Access Control and Authentication
- Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino:
Using IFTTT to Express and Enforce UCON Obligations. 213-231 - Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki:
Evaluation of Software PUF Based on Gyroscope. 232-247 - Jiqiang Lu, Zhigang Zhao, Huaqun Guo:
White-Box Implementation of the KMAC Message Authentication Code. 248-270
Cryptography II
- Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin:
Improving Signature Schemes with Tight Security Reductions. 273-292 - Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, Reza Azarderakhsh:
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings. 293-309 - Lukasz Krzywiecki, Marta Slowik, Michal Szala:
Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios. 310-324 - Deepak Kumar Dalai, Santu Pal:
Recovering Internal States of Grain-v1. 325-337
Data and User Privacy
- Miroslaw Kutylowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala:
GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures. 341-361 - Andrew Rae, Asma Patel:
Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K. 362-380 - Kamalkumar R. Macwan, Sankita J. Patel:
Privacy Preserving Approach in Dynamic Social Network Data Publishing. 381-398
Short Paper I
- Arnaud Sipasseuth, Thomas Plantard, Willy Susilo:
Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications. 401-412 - Chang Seng Sin, Huey Voon Chen:
Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem. 413-422 - Peter T. Nkomo, Marijke Coetzee:
Development Activities, Tools and Techniques of Secure Microservices Compositions. 423-433 - Nasim Maleki, Ali A. Ghorbani:
Generating Phishing Emails Using Graph Database. 434-449
Short Paper II
- Wenjuan Li, Weizhi Meng, Lam For Kwok:
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. 453-463 - Chris Pelchen, David Jaeger, Feng Cheng, Christoph Meinel:
The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm. 464-475 - Mahdieh Safarzadeh, Hossein Gharaee, Amir Hossein Panahi:
A Novel and Comprehensive Evaluation Methodology for SIEM. 476-488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.