default search action
21. ACISP 2016: Melbourne, VIC, Australia
- Joseph K. Liu, Ron Steinfeld:
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9722, Springer 2016, ISBN 978-3-319-40252-9
Invited Papers
- Shuang Zhao, Xiapu Luo, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, Man Ho Au:
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing. 3-19 - Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang:
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services. 20-39 - Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xingmin Cui, Eric Ke Wang, Jun-bin Fang:
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids. 40-56 - Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. 57-76 - Min Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh, Wun-She Yap:
Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models. 77-93 - Zhe Liu, Johann Großschädl, Lin Li, Qiuliang Xu:
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes. 94-112
National Security Infrastructure
- Alastair Nisbet, Andrew Woodward:
A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. 115-127 - Youngbae Song, Hyoungshick Kim, Jun Ho Huh:
On the Guessability of Resident Registration Numbers in South Korea. 128-138
Social Network Security
- Shen Yan, Shiran Pan, Yuhang Zhao, Wen Tao Zhu:
Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy. 141-157
Bitcoin Security
- Colin Boyd, Christopher Carr:
Fair Client Puzzles from the Bitcoin Blockchain. 161-177
Statistical Privacy
- Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi:
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database. 181-197 - Zhen Li, Wei Wu:
Reversible Data Hiding for Encrypted Images Based on Statistical Learning. 198-212
Network Security
- Shigang Liu, Yu Wang, Chao Chen, Yang Xiang:
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection. 215-228
Smart City Security
- Catalin Gosman, Tudor Cornea, Ciprian Dobre, Florin Pop, Aniello Castiglione:
Putting the User in Control of the Intelligent Transportation System. 231-246
Digital Forensics
- Carsten Rudolph:
Exploring the Space of Digital Evidence - Position Paper. 249-262
Lightweight Security
- Yanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, Kim-Kwang Raymond Choo:
Towards Lightweight Anonymous Entity Authentication for IoT Applications. 265-280 - Shaohua Tang, Bo Lv, Wuqiang Shen:
Hybrid MQ Signature for Embedded Device. 281-290
Secure Batch Processing
- Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou:
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. 293-309 - Yang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, Wei Hu:
Accelerating Oblivious Transfer with Batch Multi-exponentiation. 310-326
Pseudo Random/One-way Function
- Xun Yi, Xuechao Yang, Yong Feng, Fengling Han, Ron G. van Schyndel:
CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps. 329-342 - Avijit Dutta, Mridul Nandi, Goutam Paul:
One-Key Compression Function Based MAC with Security Beyond Birthday Bound. 343-358
Cloud Storage Security
- Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. 361-375 - Kaitai Liang, Atsuko Miyaji, Chunhua Su:
Secure and Traceable Framework for Data Circulation. 376-388 - Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. 389-405
Password/QR Code Security
- Yang-Wai Chow, Willy Susilo, Guomin Yang, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi:
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. 409-425 - Moritz Horsch, Mario Schlipf, Johannes Braun, Johannes Buchmann:
Password Requirements Markup Language. 426-439
Functional Encryption and Attribute-Based Cryptosystem
- Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han:
Leakage-Resilient Functional Encryption via Pair Encodings. 443-460 - Lin Hou, Junzuo Lai, Lixian Liu:
Secret Handshakes with Dynamic Expressive Matching Policy. 461-476 - Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. 477-494 - Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji:
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption. 495-508 - Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. 509-524 - Peng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang:
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update. 525-540
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.