Sign in
ACISP (1)
2016
2017
2016
2017
Keyphrases
Publications
2017
Mengce Zheng
,
Noboru Kunihiro
,
Honggang Hu
Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference.
ACISP (1)
(2017)
Hui Cui
,
Robert H. Deng
,
Joseph K. Liu
,
Yingjiu Li
Attribute-Based Encryption with Expressive and Authorized Keyword Search.
ACISP (1)
(2017)
Michael Till Beck
,
Jan Camenisch
,
David Derler
,
Stephan Krenn
,
Henrich C. Pöhls
,
Kai Samelin
,
Daniel Slamanig
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures.
ACISP (1)
(2017)
Hong Zhu
,
Zhuolin Mei
,
Bing Wu
,
Hongbo Li
,
Zongmin Cui
Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing.
ACISP (1)
(2017)
Yuhei Watanabe
,
Takanori Isobe
,
Masakatu Morii
Conditional Differential Cryptanalysis for Kreyvium.
ACISP (1)
(2017)
Shabnam Kasra Kermanshahi
,
Joseph K. Liu
,
Ron Steinfeld
Multi-user Cloud-Based Secure Keyword Search.
ACISP (1)
(2017)
Tingting Cui
,
Ling Sun
,
Huaifeng Chen
,
Meiqin Wang
Statistical Integral Distinguisher with Multi-structure and Its Application on AES.
ACISP (1)
(2017)
Suvradip Chakraborty
,
Goutam Paul
,
C. Pandu Rangan
Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE.
ACISP (1)
(2017)
Shengmin Xu
,
Guomin Yang
,
Yi Mu
,
Willy Susilo
Mergeable and Revocable Identity-Based Encryption.
ACISP (1)
(2017)
Tong Wu
,
Sha Ma
,
Yi Mu
,
Shengke Zeng
ID-Based Encryption with Equality Test Against Insider Attack.
ACISP (1)
(2017)
Gildas Avoine
,
Xavier Carpent
,
Barbara Kordy
,
Florent Tardif
How to Handle Rainbow Tables with External Memory.
ACISP (1)
(2017)
Shujie Cui
,
Muhammad Rizwan Asghar
,
Steven D. Galbraith
,
Giovanni Russello
Secure and Practical Searchable Encryption: A Position Paper.
ACISP (1)
(2017)
Peng Xu
,
Shuai Liang
,
Wei Wang
,
Willy Susilo
,
Qianhong Wu
,
Hai Jin
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
ACISP (1)
(2017)
Shuai Han
,
Shengli Liu
KDM-Secure Public-Key Encryption from Constant-Noise LPN.
ACISP (1)
(2017)
Shiwei Zhang
,
Yi Mu
,
Guomin Yang
,
Xiaofen Wang
Hierarchical Functional Encryption for Linear Transformations.
ACISP (1)
(2017)
Katsuyuki Takashima
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption.
ACISP (1)
(2017)
Puwen Wei
,
Wei Wang
,
Bingxin Zhu
,
Siu-Ming Yiu
Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency.
ACISP (1)
(2017)
Hassan Qahur Al Mahri
,
Leonie Simpson
,
Harry Bartlett
,
Ed Dawson
,
Kenneth Koon-Ho Wong
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes.
ACISP (1)
(2017)
Ivan Tjuawinata
,
Tao Huang
,
Hongjun Wu
Cryptanalysis of Simpira v2.
ACISP (1)
(2017)
Xiao Zhang
,
Shengli Liu
,
Dawu Gu
Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption.
ACISP (1)
(2017)
Atsushi Takayasu
,
Yohei Watanabe
Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance.
ACISP (1)
(2017)
Yanjiang Yang
,
Joseph K. Liu
,
Zhuo Wei
,
Xinyi Huang
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
ACISP (1)
(2017)
Yuki Funabiki
,
Yosuke Todo
,
Takanori Isobe
,
Masakatu Morii
Improved Integral Attack on HIGHT.
ACISP (1)
(2017)
Ahto Buldas
,
Matthias Geihs
,
Johannes Buchmann
Long-Term Secure Commitments via Extractable-Binding Commitments.
ACISP (1)
(2017)
volume 10342, 2017
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I
ACISP (1)
10342 (2017)
2016
Cong Zuo
,
Jun Shao
,
Guiyi Wei
,
Mande Xie
,
Min Ji
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
ACISP (1)
(2016)
Catalin Gosman
,
Tudor Cornea
,
Ciprian Dobre
,
Florin Pop
,
Aniello Castiglione
Putting the User in Control of the Intelligent Transportation System.
ACISP (1)
(2016)
Yanjiang Yang
,
Haibin Cai
,
Zhuo Wei
,
Haibing Lu
,
Kim-Kwang Raymond Choo
Towards Lightweight Anonymous Entity Authentication for IoT Applications.
ACISP (1)
(2016)
Shigang Liu
,
Yu Wang
,
Chao Chen
,
Yang Xiang
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection.
ACISP (1)
(2016)
Zuoxia Yu
,
Man Ho Au
,
Qiuliang Xu
,
Rupeng Yang
,
Jinguang Han
Leakage-Resilient Functional Encryption via Pair Encodings.
ACISP (1)
(2016)
Yang Sun
,
Qianhong Wu
,
Jingwen Liu
,
Jianwei Liu
,
Xinyi Huang
,
Bo Qin
,
Wei Hu
Accelerating Oblivious Transfer with Batch Multi-exponentiation.
ACISP (1)
(2016)
Alastair Nisbet
,
Andrew Woodward
A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs.
ACISP (1)
(2016)
Tao Jiang
,
Xiaofeng Chen
,
Qianhong Wu
,
Jianfeng Ma
,
Willy Susilo
,
Wenjing Lou
Towards Efficient Fully Randomized Message-Locked Encryption.
ACISP (1)
(2016)
Zhen Li
,
Wei Wu
Reversible Data Hiding for Encrypted Images Based on Statistical Learning.
ACISP (1)
(2016)
Avijit Dutta
,
Mridul Nandi
,
Goutam Paul
One-Key Compression Function Based MAC with Security Beyond Birthday Bound.
ACISP (1)
(2016)
Lin Hou
,
Junzuo Lai
,
Lixian Liu
Secret Handshakes with Dynamic Expressive Matching Policy.
ACISP (1)
(2016)
Colin Boyd
,
Christopher Carr
Fair Client Puzzles from the Bitcoin Blockchain.
ACISP (1)
(2016)
Yinhao Jiang
,
Willy Susilo
,
Yi Mu
,
Fuchun Guo
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
ACISP (1)
(2016)
Rui Xu
,
Kirill Morozov
,
Yanjiang Yang
,
Jianying Zhou
,
Tsuyoshi Takagi
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
ACISP (1)
(2016)
Patrick McCorry
,
Malte Möser
,
Siamak Fayyaz Shahandashti
,
Feng Hao
Towards Bitcoin Payment Networks.
ACISP (1)
(2016)
Peng Zhang
,
Zehong Chen
,
Kaitai Liang
,
Shulan Wang
,
Ting Wang
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update.
ACISP (1)
(2016)
Kaitai Liang
,
Atsuko Miyaji
,
Chunhua Su
Secure and Traceable Framework for Data Circulation.
ACISP (1)
(2016)
Moritz Horsch
,
Mario Schlipf
,
Johannes Braun
,
Johannes Buchmann
Password Requirements Markup Language.
ACISP (1)
(2016)
Zhe Liu
,
Johann Großschädl
,
Lin Li
,
Qiuliang Xu
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes.
ACISP (1)
(2016)
Shaohua Tang
,
Bo Lv
,
Wuqiang Shen
Hybrid MQ Signature for Embedded Device.
ACISP (1)
(2016)
Youngbae Song
,
Hyoungshick Kim
,
Jun Ho Huh
On the Guessability of Resident Registration Numbers in South Korea.
ACISP (1)
(2016)
Min Cherng Lee
,
Robin Mitra
,
Emmanuel Lazaridis
,
An Chow Lai
,
Yong Kheng Goh
,
Wun-She Yap
Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models.
ACISP (1)
(2016)
Carsten Rudolph
Exploring the Space of Digital Evidence - Position Paper.
ACISP (1)
(2016)
Yang-Wai Chow
,
Willy Susilo
,
Guomin Yang
,
James G. Phillips
,
Ilung Pranata
,
Ari Moesriami Barmawi
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
ACISP (1)
(2016)
volume 9722, 2016
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I
ACISP (1)
9722 (2016)