default search action
13. ICICS 2011: Beijing, China
- Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu:
Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings. Lecture Notes in Computer Science 7043, Springer 2011, ISBN 978-3-642-25242-6
Digital Signatures
- Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou:
Forward Secure Ring Signature without Random Oracles. 1-14 - Jin Wang, Bo Sun:
Ring Signature Schemes from Lattice Basis Delegation. 15-28
Public Key Encryption
- Xinfeng Lei, Rui Xue, Ting Yu:
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles. 29-41 - Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing:
A Variant of Boyen-Waters Anonymous IBE Scheme. 42-56 - Jiageng Chen, Keita Emura, Atsuko Miyaji:
Non-interactive Opening for Ciphertexts Encrypted by Shared Keys. 57-68
Cryptographic Protocols
- Yongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen:
Lightweight RFID Mutual Authentication Protocol against Feasible Problems. 69-77 - Jean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez:
A Note on a Privacy-Preserving Distance-Bounding Protocol. 78-92 - Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Delegable Provable Data Possession for Remote Data in the Clouds. 93-111 - Kai-Yuen Cheong, Atsuko Miyaji:
Unconditionally Secure Oblivious Transfer Based on Channel Delays. 112-120
Applied Cryptography
- Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Lei Zhang:
Preserving Security and Privacy in Large-Scale VANETs. 121-135 - Yuyin Yu, Mingsheng Wang:
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. 136-142 - Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi:
Ideal Secret Sharing Schemes with Share Selectability. 143-157
Multimedia Security
- Panpan Niu, Xiangyang Wang, Mingyu Lu:
A Novel Pyramidal Dual-Tree Directional Filter Bank Domain Color Image Watermarking Algorithm. 158-172 - Xiang Yin, Shuoling Peng, Xinshan Zhu:
Detection for Multiplicative Watermarking in DCT Domain by Cauchy Model. 173-183
Algorithms and Evaluation
- Zhengjun Cao, Xiao Fan:
Extension of Barreto-Voloch Root Extraction Method. 184-189 - Yusong Du, Fangguo Zhang:
Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions. 190-201 - Lei Wang, Jiwu Jing, Zongbin Liu, Lingchen Zhang, Wuqiong Pan:
Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA. 202-215
Cryptanalysis
- Nicolas T. Courtois, Michal Misztal:
First Differential Attack on Full 32-Round GOST. 216-227 - Gaoli Wang:
Collision Attack for the Hash Function Extended MD4. 228-241 - Zhiqiang Liu, Dawu Gu, Ya Liu, Juanru Li, Wei Li:
Linear Cryptanalysis of ARIA Block Cipher. 242-254 - Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake:
Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha. 255-266
Security Applications
- Dan Wang, Xiaodong Zhou, Wenbing Zhao:
Behavior Analysis-Based Dynamic Trust Measurement Model. 267-281 - Wenhao Wang, Dongdai Lin, Zhenqi Li, Tianze Wang:
Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications. 282-296 - Xinshan Zhu:
Analyzing the Performance of Dither Modulation in Presence of Composite Attacks. 297-305
Wireless Network Security
- Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao:
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. 306-318 - Ze Wang, Maode Ma, Wenju Liu, Xixi Wei:
A Unified Security Framework for Multi-domain Wireless Mesh Networks. 319-329
System Security
- Lian Yu, Shizhong Wu, Tao Guo, Guowei Dong, Cheng-Cheng Wan, Yin-Hang Jing:
Ontology Model-Based Static Analysis of Security Vulnerabilities. 330-344 - Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma:
A Multi-compositional Enforcement on Information Flow Security. 345-359 - Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu:
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming. 360-373 - G. S. Badrinath, Aditya Nigam, Phalguni Gupta:
An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching Scores. 374-387
Network Security
- Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. 388-398 - Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani:
Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation. 399-413 - Mu Yang, Vladimiro Sassone:
Minimising Anonymity Loss in Anonymity Networks under DoS Attacks. 414-429
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.