default search action
22. ACISP 2017: Auckland, New Zealand
- Josef Pieprzyk, Suriadi Suriadi:
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10343, Springer 2017, ISBN 978-3-319-59869-7
Symmetric Cryptography
- Sumanta Sarkar, Habeeb Syed:
Analysis of Toeplitz MDS Matrices. 3-18 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
Reforgeability of Authenticated Encryption Schemes. 19-37 - Yusuke Naito:
Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations. 38-57
Software Security
- Fan Jiang, Cen Zhang, Shaoyin Cheng:
FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability. 61-79 - Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang, Yingjiao Niu:
Splitting Third-Party Libraries' Privileges from Android Apps. 80-94 - Yan Lin, Xiaoxiao Tang, Debin Gao:
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking. 95-112
Network Security
- Jean-Guillaume Dumas, Vincent Zucca:
Prover Efficient Public Verification of Dense or Sparse/Structured Matrix-Vector Multiplication. 115-134 - Weizhong Qiang, JiaZhen Guo, Hai Jin, Weifeng Li:
JSFfox: Run-Timely Confining JavaScript for Firefox. 135-150
Malware Detection
- Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu, Qiaolin Hu:
PriMal: Cloud-Based Privacy-Preserving Malware Detection. 153-172 - Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu, Yi Wang, Qiang Yang:
A New Malware Classification Approach Based on Malware Dynamic Analysis. 173-189
Privacy
- Keita Emura:
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions. 193-213 - Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu, Ye Wang:
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data. 214-234 - Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu, Su Peng:
Private Graph Intersection Protocol. 235-248 - Mousumi Akter, Tanzima Hashem:
Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy. 249-260 - Alex Davidson, Carlos Cid:
An Efficient Toolkit for Computing Private Set Operations. 261-278
Authentication
- Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu, Yong Yu:
Privacy-Preserving k-time Authenticated Secret Handshakes. 281-300 - Weizhi Meng, Lee Wang Hao, Man Ho Au, Zhe Liu:
Exploring Effect of Location Number on Map-Based Graphical Password Authentication. 301-313 - Yang-Wai Chow, Willy Susilo, Joseph Tonien, Wei Zong:
A QR Code Watermarking Approach Based on the DWT-DCT Technique. 314-331
Elliptic Curve Cryptography
- Theo Fanuela Prabowo, Chik How Tan:
Generating Complete Edwards Curves. 335-348 - Eunkyung Kim, Mehdi Tibouchi:
Secure GLS Recomposition for Sum-of-Square Cofactors. 349-365 - Reza Rezaeian Farashahi, Seyed Gholamhossein Hosseini:
Differential Addition on Twisted Edwards Curves. 366-378
Short Papers
- Abhishek Singh, Binanda Sengupta, Sushmita Ruj:
Certificate Transparency with Enhancements and Short Proofs. 381-389 - Moritz Horsch, Johannes Braun, Dominique Metz, Johannes Buchmann:
Update-Tolerant and Revocable Password Backup. 390-397 - Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach:
Redactable Graph Hashing, Revisited - (Extended Abstract). 398-405 - Swapan Maiti, Shamit Ghosh, Dipanwita Roy Chowdhury:
On the Security of Designing a Cellular Automata Based Stream Cipher. 406-413 - Clark D. Thomborson, Marc Jeanmougin:
Stegogames. 414-421 - Dwight Horne, Suku Nair:
A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes. 422-434 - Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin, Shizhen Wang, Guozhong Sun:
Fully Context-Sensitive CFI for COTS Binaries. 435-442 - Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu, Dingding Jia:
Dual-Mode Cryptosystem Based on the Learning with Errors Problem. 443-451 - Nicholas R. Rodofile, Thomas Schmidt, Sebastian T. Sherry, Christopher Djamaludin, Kenneth Radke, Ernest Foo:
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure. 452-459 - Jason H. M. Ying, Noboru Kunihiro:
Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme. 460-467
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.