default search action
ICCSP 2020: Nanjing, China
- ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020. ACM 2020, ISBN 978-1-4503-7744-7
- Zedong Sun, Chunxiang Gu, Yonghui Zheng:
Block Sieve Reduction: A New Random Sampling Reduction Algorithm Based on Sieve Algorithms. 1-5 - Yihong Long, Feng Xiong:
Secret Sharing Based BLMQ Signature Generation. 6-12 - Pansilu Pitigalaarachchi, Chandana Gamage:
Efficiency Enhancements for Practical Techniques for Searches on Encrypted Data. 13-18 - Martin Ocenas, Ivan Homoliak, Petr Hanácek, Kamil Malinka:
Security and Encryption at Modern Databases. 19-23 - Jing Chen, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Xingkai Wang:
Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage. 24-30 - Nghia Duong-Trung, Ha Xuan Son, Hai Trieu Le, Tan Tai Phan:
On Components of a Patient-centered Healthcare System Using Smart Contract. 31-35 - Shuangbao Wang, Matthew Rohde, Amjad Ali:
Quantum Cryptography and Simulation: Tools and Techniques. 36-41 - Wei Ding, Zidong Hua, Panhui Li, Qiushi Gong, Yuxi Cheng:
Botnet Host Detection Based on Heartbeat Association. 42-46 - Chengwei Ai, Weiyu Dong, Zicong Gao:
A Novel Concolic Execution Approach on Embedded Device. 47-52 - Kunyu Liu, Liang Zhou:
Routing Authentication Chain Mechanism to Resist AODV Black Hole Attacks. 53-57 - Shixuan Wang, Jiabin Yuan, Shudi Chen:
Quality-based Score Level Fusion for Continuous Authentication with Motion Sensor and Face. 58-62 - Fukang Liu, Guorui Wu, Yang Liu:
A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks. 63-67 - Zhouping Cui, Weihai Li, Chaohai Yu, Nenghai Yu:
A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks. 68-73 - Tao Chen, Guangming Zhou, Zhangpu Liu, Tao Jing:
A Novel Ensemble Anomaly based Approach for Command and Control Channel Detection. 74-78 - Zhongxin Yang, Zhifeng Chen, Ping Zhang, Ming Liu, Qingbao Li:
An Information Intelligent Search Method for Computer Forensics Based on Text Similarity. 79-83 - Quanmin Wang, Xuan Wei:
The Detection of Network Intrusion Based on Improved Adaboost Algorithm. 84-88 - Hongman Wang, Yongbin Yuan, Fangchun Yang:
A Personal Data Determination Method Based On Blockchain Technology and Smart Contract. 89-94 - Hui Chen:
Quantum Relay Blockchain and Its Applications in Key Service. 95-99 - Gang Zhao, Hui He, Bingbing Di:
Design and Implementation of the Digital Education Resources Authentication System Based on Blockchain. 100-104 - Nghia Duong-Trung, Ha Xuan Son, Hai Trieu Le, Tan Tai Phan:
Smart Care: Integrating Blockchain Technology into the Design of Patient-centered Healthcare Systems. 105-109 - Enmei Lai, Wenjun Luo:
Static Analysis of Integer Overflow of Smart Contracts in Ethereum. 110-115 - Xincheng Yan, Yue Chen, Yuchang Zhai, Yang Ba, Xuewei Li, Hongyong Jia:
An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext Evolution. 116-125 - Yong Wang, Mengge Zhang, Zhengyu Zhu:
Detection of Voice Transformation Disguise Based on Deep Residual Net. 126-130 - Ping Wang, Jinjiang Yang, Min Zhu, Bo Liu:
A High-throughput Low-area Entropy Source Based on Asynchronous Feedback Unit. 131-135 - Yonghao Wang:
A Trust Management Model for Internet of Vehicles. 136-140 - Jian Lin, Liehui Jiang, Chengwei Ai, Shihong Chao:
A Shape-inference-based Approach to Enhance Constraint Independence Optimization. 141-145 - Lianxiao Meng, Shuangyin Ren, Gaigai Tang, Chao Yang, Wu Yang:
UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion. 146-151
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.