


default search action
17. ISC 2014: Hong Kong, China
- Sherman S. M. Chow

, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Lecture Notes in Computer Science 8783, Springer 2014, ISBN 978-3-319-13256-3
Public-Key Encryption
- Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:

Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups. 1-18 - Xianhui Lu, Bao Li, Dingding Jia:

Related-Key Security for Hybrid Encryption. 19-32
Authentication
- Li Xi, Jianxiong Shao, Kang Yang, Dengguo Feng:

ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication. 33-53 - Fei Tang, Hongda Li, Bei Liang:

Attribute-Based Signatures for Circuits from Multilinear Maps. 54-71
Symmetric Key Cryptography
- Alex Biryukov

, Dmitry Khovratovich:
PAEQ: Parallelizable Permutation-Based Authenticated Encryption. 72-89 - Gaoli Wang, Yanzhao Shen:

(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160. 90-103 - Lin Jiao, Bin Zhang, Mingsheng Wang:

Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks. 104-119
Zero-Knowledge Proofs and Arguments
- Ning Ding:

Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge. 120-139 - Sven Laur, Bingsheng Zhang:

Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols. 140-157
Outsourced and Multi-party Computations
- Yihua Zhang, Marina Blanton

:
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications. 158-178 - Toomas Krips, Jan Willemson:

Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. 179-197
Implementation
- Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:

Exploiting the Floating-Point Computing Power of GPUs for RSA. 198-215
Information Leakage
- Michele Boreale, Michela Paolini:

On Formally Bounding Information Leakage by Statistical Estimation. 216-236 - Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah

:
Structure Based Data De-Anonymization of Social Networks and Mobility Traces. 237-254
Firewall and Forensics
- Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan:

Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics. 255-272 - Sebastian Biedermann, Jakub Szefer:

SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. 273-290
Web Security
- Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen:

Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. 291-308 - Martin Stopczynski, Michael Zugelder:

Reducing User Tracking through Automatic Web Site State Isolations. 309-327
Android Security
- Britton Wolfe, Karim O. Elish

, Danfeng (Daphne) Yao
:
Comprehensive Behavior Profiling for Proactive Android Malware Detection. 328-344 - Daoyuan Wu

, Rocky K. C. Chang:
Analyzing Android Browser Apps for file: // Vulnerabilities. 345-363
Short Papers
- Zhiquan Lv, Cheng Hong, Min Zhang

, Dengguo Feng:
Expressive and Secure Searchable Encryption in the Public Key Setting. 364-376 - Aggelos Kiayias, Murat Osmanoglu, Qiang Tang

:
Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively. 377-387 - Daniel Slamanig

, Raphael Spreitzer
, Thomas Unterluggauer:
Adding Controllable Linkability to Pairing-Based Group Signatures for Free. 388-400 - Duane C. Wilson, Giuseppe Ateniese:

"To Share or not to Share" in Client-Side Encrypted Clouds. 401-412 - Christopher Jämthagen, Linus Karlsson, Paul Stankovski, Martin Hell:

eavesROP: Listening for ROP Payloads in Data Streams. 413-424 - Donald Ray, Jay Ligatti:

Defining Injection Attacks. 425-441 - Martin Salfer, Hendrik Schweppe, Claudia Eckert:

Efficient Attack Forest Construction for Automotive On-board Networks. 442-453 - Yichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing:

Winnowing Double Structure for Wildcard Query in Payload Attribution. 454-464 - Weizhi Meng

, Wenjuan Li
, Lam-for Kwok:
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. 465-476 - Sharath Hiremagalore, Daniel Barbará, Dan Fleck

, Walter Powell, Angelos Stavrou
:
transAD: An Anomaly Detection Network Intrusion Sensor for the Web. 477-489 - Pinghai Yuan, Qingkai Zeng, Yao Liu:

Using Machine Language Model for Mimimorphic Malware Detection. 490-501 - Ryan Farley, Xinyuan Wang:

CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump. 502-514 - Ashar Javed, Jens Riemer, Jörg Schwenk:

SIACHEN: A Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting Attacks. 515-528 - Wanpeng Li

, Chris J. Mitchell
:
Security Issues in OAuth 2.0 SSO Implementations. 529-541 - Javier González, Michael Hölzl

, Peter Riedl, Philippe Bonnet
, René Mayrhofer
:
A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. 542-554 - Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing:

MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices. 555-567

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














