default search action
ICCSP 2017: Wuhan, China
- Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, ICCSP 2017, Wuhan, China, March 17 - 19, 2017. ACM 2017, ISBN 978-1-4503-4867-6
Cryptography Theory and Technology
- Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:
On the Construction of the 4 x 4 Lightest Circulant MDS Matrices. 1-6 - Hong Wang, Jie Guan:
On Equivalence with Output Sequence of Grain Model. 7-11 - Xuyang Wang, Aiqun Hu, Hao Fang:
Feasibility Analysis of Lattice-based Proxy Re-Encryption. 12-16 - Sergey Polikarpov, Dmitry Petrov, Alexey Kozhevnikov:
On A Class Pseudo-Dynamic Substitutions PD-Sbox, With A Perfect Averaged Distribution of Differentials in Static Mode of Work. 17-21 - Yongfeng Niu, Yanfeng Qi:
Ternary Linear Codes with Few Weights from Functions with Two Variables. 22-27
Image Information Security and Encryption
- Hao Zhang, Tao Zhang, Huajin Chen:
Variance Analysis of Pixel-Value Differencing Steganography. 28-32 - Qi Gao, Zhi Li, Shuqin Chen:
A Video Dual Watermarking Algorithm Against Geometric Attack Based on Integer Wavelet and SIFT. 33-37 - Fenghua Li, Jingyang Yu, Lingcui Zhang, Zhe Sun, Mengfan Lv:
A Privacy-Preserving Method for Photo Sharing in Instant Message Systems. 38-43
Network Information Security
- Xidong Zhang, Weiming Tong, Zhongwei Li:
Security Communication for AMI on Basis of ECC and ESP. 44-48 - Hongmu Han, Ruixuan Li:
A Practical Compartmentation Approach for the Android App Coexistence. 49-55 - Wenying Bao, Wenbin Yao, Ming Zong, Dongbin Wang:
Cross-site Scripting Attacks on Android Hybrid Applications. 56-61 - Aidin Ameri, Daryl Johnson:
Covert Channel over Network Time Protocol. 62-65 - Xin Sun, Xindai Lu, Hua Dai:
A Matrix Decomposition based Webshell Detection Method. 66-70 - Huawei Huang, Yunyun Qu, Lunzhi Deng:
Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem. 71-75 - Danni Liu, Lijuan Wang, Can Wang, Pengyuan Huo:
A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack. 76-80 - A. P. Pljonkin:
Features of the Photon Pulse Detection Algorithm in the Quantum Key Distribution System. 81-84
Computer System Design and Security
- Mubashir Hussain, Hui Guo:
Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems. 85-90 - Bowei Zou, Mingqiu Gao, Xiaochuan Cui:
Research on Information Security Framework of Intelligent Connected Vehicle. 91-95 - Jianwei Ding, Zhouguo Chen, Yue Zhao, Hong Su, Yubin Guo, Enbo Sun:
MGeT: Malware Gene-Based Malware Dynamic Analyses. 96-101 - Xiaoshuai Xin, Cancheng Liu, Bin Wang:
Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP Protocol. 102-106 - Jing Liu, Yingxu Lai, Shixuan Zhang:
FL-GUARD: A Detection and Defense System for DDoS Attack in SDN. 107-111 - Zhiyuan Zhao, Lei Sun:
Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing Environment. 112-118 - Xingang Wang, Kuo Guo, Zhigang Gai:
A Semi-Formal Multi-Policy Secure Model for Semantic Spatial Trajectories. 119-125 - B. Chandrasekar, Bharath Ramesh, Vishalakshi Prabhu, S. Sajeev, Pratik K. Mohanty, G. Shobha:
Development of Intelligent Digital Certificate Fuzzer Tool. 126-130 - Mikhail M. Kucherov, N. A. Bogulskaya:
Logical Language of Certificate-Based Access Control in Security Models. 131-135 - Kavitha P. Thomas, A. Prasad Vinod, Neethu Robinson:
Online Biometric Authentication Using Subject-Specific Band Power features of EEG. 136-141 - Zhiqiang Jian, Long Chen:
A Defense Method against Docker Escape Attack. 142-146
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.