default search action
17. ISC 2014: Hong Kong, China
- Sherman S. M. Chow, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Lecture Notes in Computer Science 8783, Springer 2014, ISBN 978-3-319-13256-3
Public-Key Encryption
- Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups. 1-18 - Xianhui Lu, Bao Li, Dingding Jia:
Related-Key Security for Hybrid Encryption. 19-32
Authentication
- Li Xi, Jianxiong Shao, Kang Yang, Dengguo Feng:
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication. 33-53 - Fei Tang, Hongda Li, Bei Liang:
Attribute-Based Signatures for Circuits from Multilinear Maps. 54-71
Symmetric Key Cryptography
- Alex Biryukov, Dmitry Khovratovich:
PAEQ: Parallelizable Permutation-Based Authenticated Encryption. 72-89 - Gaoli Wang, Yanzhao Shen:
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160. 90-103 - Lin Jiao, Bin Zhang, Mingsheng Wang:
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks. 104-119
Zero-Knowledge Proofs and Arguments
- Ning Ding:
Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge. 120-139 - Sven Laur, Bingsheng Zhang:
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols. 140-157
Outsourced and Multi-party Computations
- Yihua Zhang, Marina Blanton:
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications. 158-178 - Toomas Krips, Jan Willemson:
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. 179-197
Implementation
- Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Floating-Point Computing Power of GPUs for RSA. 198-215
Information Leakage
- Michele Boreale, Michela Paolini:
On Formally Bounding Information Leakage by Statistical Estimation. 216-236 - Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah:
Structure Based Data De-Anonymization of Social Networks and Mobility Traces. 237-254
Firewall and Forensics
- Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan:
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics. 255-272 - Sebastian Biedermann, Jakub Szefer:
SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. 273-290
Web Security
- Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen:
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. 291-308 - Martin Stopczynski, Michael Zugelder:
Reducing User Tracking through Automatic Web Site State Isolations. 309-327
Android Security
- Britton Wolfe, Karim O. Elish, Danfeng (Daphne) Yao:
Comprehensive Behavior Profiling for Proactive Android Malware Detection. 328-344 - Daoyuan Wu, Rocky K. C. Chang:
Analyzing Android Browser Apps for file: // Vulnerabilities. 345-363
Short Papers
- Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng:
Expressive and Secure Searchable Encryption in the Public Key Setting. 364-376 - Aggelos Kiayias, Murat Osmanoglu, Qiang Tang:
Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively. 377-387 - Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer:
Adding Controllable Linkability to Pairing-Based Group Signatures for Free. 388-400 - Duane C. Wilson, Giuseppe Ateniese:
"To Share or not to Share" in Client-Side Encrypted Clouds. 401-412 - Christopher Jämthagen, Linus Karlsson, Paul Stankovski, Martin Hell:
eavesROP: Listening for ROP Payloads in Data Streams. 413-424 - Donald Ray, Jay Ligatti:
Defining Injection Attacks. 425-441 - Martin Salfer, Hendrik Schweppe, Claudia Eckert:
Efficient Attack Forest Construction for Automotive On-board Networks. 442-453 - Yichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing:
Winnowing Double Structure for Wildcard Query in Payload Attribution. 454-464 - Weizhi Meng, Wenjuan Li, Lam-for Kwok:
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. 465-476 - Sharath Hiremagalore, Daniel Barbará, Dan Fleck, Walter Powell, Angelos Stavrou:
transAD: An Anomaly Detection Network Intrusion Sensor for the Web. 477-489 - Pinghai Yuan, Qingkai Zeng, Yao Liu:
Using Machine Language Model for Mimimorphic Malware Detection. 490-501 - Ryan Farley, Xinyuan Wang:
CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump. 502-514 - Ashar Javed, Jens Riemer, Jörg Schwenk:
SIACHEN: A Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting Attacks. 515-528 - Wanpeng Li, Chris J. Mitchell:
Security Issues in OAuth 2.0 SSO Implementations. 529-541 - Javier González, Michael Hölzl, Peter Riedl, Philippe Bonnet, René Mayrhofer:
A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. 542-554 - Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing:
MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices. 555-567
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.