default search action
AsiaJCIS 2014: Wuhan, China
- Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5733-0
- Hiroki Kuzuno, Kenichi Magata:
Detecting Advertisement Module Network Behavior with Graph Modeling. 1-10 - Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai:
A Parameterless Learning Algorithm for Behavior-Based Detection. 11-18 - Takashi Matsunaka, Ayumu Kubota, Takahiro Kasama:
An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors. 19-25 - Jihong Kim:
On the False Positive Rate of the Bloom Filter in Case of Using Multiple Hash Functions. 26-30 - Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:
METRO: Measurement of End-to-End Route Trust. 31-38 - Nobuaki Furutani, Tao Ban, Junji Nakazato, Jumpei Shimamura, Jun Kitazono, Seiichi Ozawa:
Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets. 39-43 - Keiichirou Kurihara, Kazuki Katagishi:
A Simple Detection Method for DoS Attacks Based on IP Packets Entropy Values. 44-51 - Zengguang Liu, Xiaochun Yin, Hoonjae Lee:
An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW. 52-55 - Atsuko Miyaji, Mazumder Rashed, Tsuyoshi Sawada:
A New (n, n) Blockcipher Hash Function: Apposite for Short Messages. 56-63 - Yuheng Yuan, Zhenzhong He, Zheng Gong, Weidong Qiu:
Acceleration of AES Encryption with OpenCL. 64-70 - Chu-Hsing Lin, Jung-Chun Liu, Cheng-Chieh Li, Po-Wei Chu:
Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation. 71-75 - D. J. Guan, Yu-Shan Cheng:
Parity Detection for Some Three-Modulus Residue Number System. 76-81 - Caixue Zhou:
Provably Secure and Efficient Multi-receiver Identity-Based Generalized Signcryption Scheme. 82-88 - Shengbo Peng, Ou Ruan, Jing Zhou, Zaixing Chen:
A New Identity-Based Authentication Scheme for SIP. 90-95 - Juanjuan Li, Zhenhua Liu, Longhui Zu:
Chosen-Ciphertext Secure Multi-use Unidirectional Attribute-Based Proxy Re-Encryptions. 96-103 - Junjie Qiu, Gi-Hyun Hwang, Hoonjae Lee:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. 104-110 - Si-Wei Ren, Ke-Wei Lu:
Bit Security for Lucas-Based One-Way Function. 111-118 - Chun-I Fan, Wei-Zhe Sun, Shih-Wei Huang, Wen-Shenq Juang, Jheng-Jia Huang:
Strongly Privacy-Preserving Communication Protocol for VANETs. 119-126 - Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, Wen-Tsuen Chen:
Anonymous Credential Scheme Supporting Active Revocation. 127-132 - Yufeng Wang, Jing Xu:
Overview on Privacy-Preserving Profile-Matching Mechanisms in Mobile Social Networks in Proximity (MSNP). 133-140 - Teng Yu Huang, Hung-Yu Chien:
Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs. 141-147 - Shinichi Matsumoto, Kouichi Sakurai:
Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image. 148-155 - He-Ming Ruan, Chin-Laung Lei:
Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage. 156-163 - Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Yuji Yamaoka, Takanori Oikawa:
Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage. 164-169 - Yu-Chih Huang, Wen-Chung Kuo, Ching-Nung Yang:
Data Hiding Based on Radix-2. 170-174
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.