Sign in
ACISP (2)
2016
2017
2016
2017
Keyphrases
Publications
2017
Keita Emura
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions.
ACISP (2)
(2017)
Sumanta Sarkar
,
Habeeb Syed
Analysis of Toeplitz MDS Matrices.
ACISP (2)
(2017)
Weizhong Qiang
,
JiaZhen Guo
,
Hai Jin
,
Weifeng Li
JSFfox: Run-Timely Confining JavaScript for Firefox.
ACISP (2)
(2017)
Alex Davidson
,
Carlos Cid
An Efficient Toolkit for Computing Private Set Operations.
ACISP (2)
(2017)
Weizhong Qiang
,
Yingda Huang
,
Deqing Zou
,
Hai Jin
,
Shizhen Wang
,
Guozhong Sun
Fully Context-Sensitive CFI for COTS Binaries.
ACISP (2)
(2017)
Nicholas R. Rodofile
,
Thomas Schmidt
,
Sebastian T. Sherry
,
Christopher Djamaludin
,
Kenneth Radke
,
Ernest Foo
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.
ACISP (2)
(2017)
Yan Lin
,
Xiaoxiao Tang
,
Debin Gao
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking.
ACISP (2)
(2017)
Abhishek Singh
,
Binanda Sengupta
,
Sushmita Ruj
Certificate Transparency with Enhancements and Short Proofs.
ACISP (2)
(2017)
Mitsuhiro Hattori
,
Takato Hirano
,
Nori Matsuda
,
Rina Shimizu
,
Ye Wang
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
ACISP (2)
(2017)
Andreas Erwig
,
Marc Fischlin
,
Martin Hald
,
Dominik Helm
,
Robert Kiel
,
Florian Kübler
,
Michael Kümmerlin
,
Jakob Laenge
,
Felix Rohrbach
Redactable Graph Hashing, Revisited - (Extended Abstract).
ACISP (2)
(2017)
Jean-Guillaume Dumas
,
Vincent Zucca
Prover Efficient Public Verification of Dense or Sparse/Structured Matrix-Vector Multiplication.
ACISP (2)
(2017)
Christian Forler
,
Eik List
,
Stefan Lucks
,
Jakob Wenzel
Reforgeability of Authenticated Encryption Schemes.
ACISP (2)
(2017)
Swapan Maiti
,
Shamit Ghosh
,
Dipanwita Roy Chowdhury
On the Security of Designing a Cellular Automata Based Stream Cipher.
ACISP (2)
(2017)
Clark D. Thomborson
,
Marc Jeanmougin
Stegogames.
ACISP (2)
(2017)
Jason H. M. Ying
,
Noboru Kunihiro
Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme.
ACISP (2)
(2017)
Weizhi Meng
,
Lee Wang Hao
,
Man Ho Au
,
Zhe Liu
Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
ACISP (2)
(2017)
Hao Sun
,
Jinshu Su
,
Xiaofeng Wang
,
Rongmao Chen
,
Yujing Liu
,
Qiaolin Hu
PriMal: Cloud-Based Privacy-Preserving Malware Detection.
ACISP (2)
(2017)
Ying Fang
,
Bo Yu
,
Yong Tang
,
Liu Liu
,
Zexin Lu
,
Yi Wang
,
Qiang Yang
A New Malware Classification Approach Based on Malware Dynamic Analysis.
ACISP (2)
(2017)
Jiawei Zhan
,
Quan Zhou
,
Xiaozhuo Gu
,
Yuewu Wang
,
Yingjiao Niu
Splitting Third-Party Libraries' Privileges from Android Apps.
ACISP (2)
(2017)
Theo Fanuela Prabowo
,
Chik How Tan
Generating Complete Edwards Curves.
ACISP (2)
(2017)
Yangguang Tian
,
Shiwei Zhang
,
Guomin Yang
,
Yi Mu
,
Yong Yu
Privacy-Preserving k-time Authenticated Secret Handshakes.
ACISP (2)
(2017)
Fan Jiang
,
Cen Zhang
,
Shaoyin Cheng
FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability.
ACISP (2)
(2017)
Reza Rezaeian Farashahi
,
Seyed Gholamhossein Hosseini
Differential Addition on Twisted Edwards Curves.
ACISP (2)
(2017)
Jingnan He
,
Wenpan Jing
,
Bao Li
,
Xianhui Lu
,
Dingding Jia
Dual-Mode Cryptosystem Based on the Learning with Errors Problem.
ACISP (2)
(2017)
Eunkyung Kim
,
Mehdi Tibouchi
Secure GLS Recomposition for Sum-of-Square Cofactors.
ACISP (2)
(2017)
Moritz Horsch
,
Johannes Braun
,
Dominique Metz
,
Johannes Buchmann
Update-Tolerant and Revocable Password Backup.
ACISP (2)
(2017)
Yusuke Naito
Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations.
ACISP (2)
(2017)
Yang-Wai Chow
,
Willy Susilo
,
Joseph Tonien
,
Wei Zong
A QR Code Watermarking Approach Based on the DWT-DCT Technique.
ACISP (2)
(2017)
Dwight Horne
,
Suku Nair
A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes.
ACISP (2)
(2017)
Fucai Zhou
,
Zifeng Xu
,
Yuxi Li
,
Jian Xu
,
Su Peng
Private Graph Intersection Protocol.
ACISP (2)
(2017)
Mousumi Akter
,
Tanzima Hashem
Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy.
ACISP (2)
(2017)
volume 10343, 2017
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II
ACISP (2)
10343 (2017)
2016
Lingyue Qin
,
Huaifeng Chen
,
Xiaoyun Wang
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques.
ACISP (2)
(2016)
Nasour Bagheri
,
Florian Mendel
,
Yu Sasaki
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ.
ACISP (2)
(2016)
Jiageng Chen
,
Jesen Teh
,
Chunhua Su
,
Azman Samsudin
,
Junbin Fang
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
ACISP (2)
(2016)
Shiran Pan
,
Shen Yan
,
Wen Tao Zhu
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes.
ACISP (2)
(2016)
Martin W. Bunder
,
Abderrahmane Nitaj
,
Willy Susilo
,
Joseph Tonien
A New Attack on Three Variants of the RSA Cryptosystem.
ACISP (2)
(2016)
Keting Jia
,
Ning Wang
Impossible Differential Cryptanalysis of 14-Round Camellia-192.
ACISP (2)
(2016)
Xiling Luo
,
Yili Ren
,
Jingwen Liu
,
Jiankun Hu
,
Weiran Liu
,
Zhen Wang
,
Wei Xu
,
Qianhong Wu
Identity-Based Group Encryption.
ACISP (2)
(2016)
Shengmin Xu
,
Guomin Yang
,
Yi Mu
,
Sha Ma
Proxy Signature with Revocation.
ACISP (2)
(2016)
Kai He
,
Jian Weng
,
Man Ho Au
,
Yijun Mao
,
Robert H. Deng
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
ACISP (2)
(2016)
Tong Li
,
Zheli Liu
,
Ping Li
,
Chunfu Jia
,
Zoe Lin Jiang
,
Jin Li
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
ACISP (2)
(2016)
Min Yang
,
Fei Xu
,
Kam-Pui Chow
Interest Profiling for Security Monitoring and Forensic Investigation.
ACISP (2)
(2016)
Ling Song
,
Zhangjie Huang
,
Qianqian Yang
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA.
ACISP (2)
(2016)
Atsushi Takayasu
,
Noboru Kunihiro
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs.
ACISP (2)
(2016)
Takashi Yamakawa
,
Goichiro Hanaoka
,
Noboru Kunihiro
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information.
ACISP (2)
(2016)
Miroslaw Kutylowski
,
Lucjan Hanzlik
,
Kamil Kluczniak
Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats.
ACISP (2)
(2016)
Arcangelo Castiglione
,
Alfredo De Santis
,
Barbara Masucci
,
Francesco Palmieri
,
Aniello Castiglione
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
ACISP (2)
(2016)
Christian Forler
,
Eik List
,
Stefan Lucks
,
Jakob Wenzel
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
ACISP (2)
(2016)
volume 9723, 2016
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II
ACISP (2)
9723 (2016)