default search action
ICCSP 2018: Guiyang, China
- Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, Guiyang, China, March 16-19, 2018. ACM 2018
Information Encryption and Identification
- Jiang Du, Xia Fan:
Adaptive Watermark Based on Screen. 1-4 - Yiran Shi:
A Method of Discriminating User's Identity Similarity Based on Username Feature Greedy Matching. 5-9 - Yong Fang, Xiao Long, Liang Liu, Cheng Huang:
DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN. 10-15 - Hongyan Wang, Vincent J. van Heuven:
Relative Contribution of Vowel Quality and Duration to Native Language Identification in Foreign-Accented English. 16-20
Cloud Computing and Data Encryption
- Alexy Gene Castillo, Sherwin M. Telan, Thelma D. Palaoag:
Cloud-based Data Mining Framework: A Model to Improve Maternal Healthcare. 21-28 - Xiuze Dong, Li Zhang, Xianwei Gao:
An Efficient FPGA Implementation of ECC Modular Inversion over F256. 29-33 - Yang Wei, Jiang Du:
The Defect of DTLS toward Detected Aged Packets. 34-39 - Jianhong Zhang, Peirong Ou, Wenle Bai:
On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment. 40-44 - Wei-Tao Song, Bin Hu, Xiu-Feng Zhao:
Multi-bit Leveled Homomorphic Encryption of Message Matrices. 45-50 - Leihang Chen, Jiang Du:
An Audit Model Based On FSM for Offline Synchronization System. 51-55 - Chengcheng Xu, Jinshu Su, Shuhui Chen:
Exploring Efficient NFA Data Structures to Accelerate DFA Generation. 56-61 - Keishiro Fukushima, Toru Nakamura, Daisuke Ikeda, Shinsaku Kiyomoto:
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features. 62-66
Network Security and Technology
- Trisha Anne Cayetano, Averyl Dogao, Cristopher Guipoc, Thelma D. Palaoag:
Cyber-Physical IT Assessment Tool and Vulnerability Assessment for Semiconductor Companies. 67-71 - Zhong Hong, Fei Tang, Wenjun Luo:
Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks. 72-76 - Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Biao Qi:
RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection. 77-81 - Vasileios Mavroeidis, Audun Jøsang:
Data-Driven Threat Hunting Using Sysmon. 82-88 - Shenwen Wang, Yonghui Yang, Tao Xia, Weiyan Zhang:
A Role and Node Based Access Control Model for Industrial Control Network. 89-94 - Jiangyong Shi, Yingzhi Zeng, Wenhao Wang, Yuexiang Yang:
Feedback based Sampling for Intrusion Detection in Software Defined Network. 95-99 - Chaochao Xing, Yun Wu, Chaoyuan Cui:
VirtAPCA: An Active and Passive Coexistence Attack Model on Xen. 100-104 - Rinkel Hananto, Charles Lim, Heru Purnomo Ipung:
Detecting Network Security Threats Using Domain Name System and NetFlow Traffic. 105-109 - Haiyou Sun, Sheng Xiao:
DNA-X: Dynamic Network Authentication using SGX. 110-115 - Shan-Shan Jia, Ya-Bin Xu:
The APT Detection Method based on Attack Tree for SDN. 116-121 - Lintao Dang, Qiang Li, Jun Wu, Jianhua Li:
A Hierarchical Access Control Encryption Scheme Based on Partially Ordered Set. 122-127 - Senhao Wen, Zhiyuan Zhao, Hanbing Yan:
Detecting Malicious Websites in Depth through Analyzing Topics and Web-pages. 128-133
System Security and Attack Detection
- Yang Zhang, Hou-de Quan, Xiong-wei Li:
Data Activated Processor Hardware Trojan Detection Using Differential Bit Power Analysis. 134-137 - Bo Li, Bo Jiang:
Cache Attack on AES for Android Smartphone. 138-143 - Yi Zhang, Yuexiang Yang, Xiaolei Wang:
A Novel Android Malware Detection Approach Based on Convolutional Neural Network. 144-149 - Uyangaa Khuchit, Yonghong Bai, Liji Wu, Xiangmin Zhang:
An Improved Cross-Coupled NAND Gates PUF for Bank IC Card. 150-153 - Qilong Zhang, Yun Wu, Chaoyuan Cui:
A New Method of Live Tracking of Process Memory. 154-158 - Jie Xiang, Long Chen:
A Method of Docker Container Forensics Based on API. 159-164 - Weiqing Cao, Xing Zhao, Fayou Yuan:
Research on Faults Propagation in Linux OS. 165-169 - Yong Fang, Jiayi Peng, Liang Liu, Cheng Huang:
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM. 170-174 - Xinli Xiong, Guangsheng Zhao, Xian Wang:
A System Attack Surface Based MTD Effectiveness and Cost Quantification Framework. 175-179
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.