default search action
16. ICICS 2014: Hong Kong, China
- Lucas Chi Kwong Hui, S. H. Qing, Elaine Shi, Siu-Ming Yiu:
Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8958, Springer 2015, ISBN 978-3-319-21965-3 - Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:
Error-Tolerant Algebraic Side-Channel Attacks Using BEE. 1-15 - Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang:
SEDB: Building Secure Database Services for Sensitive Data. 16-30 - Qianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng:
Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices. 31-48 - Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen:
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. 49-60 - Hong Zhang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
4P_VES: A Collusion-Resistant Accountable Virtual Economy System. 61-73 - Ahmad Ahmadi, Reihaneh Safavi-Naini:
Privacy-Preserving Distance-Bounding Proof-of-Knowledge. 74-88 - Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi:
Distance Lower Bounding. 89-104 - Vandana Guleria, Ratna Dutta:
Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework. 105-119 - Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, Dawu Gu:
TagDroid: Hybrid SSL Certificate Verification in Android. 120-131 - Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu:
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter. 132-142 - Peeter Laud:
A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation. 143-157 - Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim:
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors. 158-175 - Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security. 176-190 - Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:
Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation. 191-199 - Yingxian Zheng, Yongbin Zhou, Zhenmei Yu, Chengyu Hu, Hailong Zhang:
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? 200-214 - Y. Sreenivasa Rao, Ratna Dutta:
Attribute Based Key-Insulated Signatures with Message Recovery. 215-229 - Sabyasachi Dutta, Avishek Adhikari:
XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra. 230-242 - Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi:
A Visual One-Time Password Authentication Scheme Using Mobile Devices. 243-257 - Rajeev Anand Sahu, Vishal Saraswat:
Secure and Efficient Scheme for Delegation of Signing Rights. 258-273 - Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang:
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. 274-289 - Asadullah Al Galib, Reihaneh Safavi-Naini:
MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis. 290-304 - Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu:
Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model. 305-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.