default search action
11. IWSEC 2016: Tokyo, Japan
- Kazuto Ogawa, Katsunari Yoshioka:
Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings. Lecture Notes in Computer Science 9836, Springer 2016, ISBN 978-3-319-44523-6
System Security
- Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu:
Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors. 3-20 - François-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar:
Hybrid Risk Assessment Model Based on Bayesian Networks. 21-40 - Ji-Hoon Jeong, Hyung Chan Kim, Il Hwan Park, Bong-Nam Noh:
Hooking Graceful Moments: A Security Analysis of Sudo Session Handling. 41-60 - Wei Xie, Yong Tang, Shuhui Chen, Yi Zhang, Yuanming Gao:
Security of Web of Things: A Survey. 61-70
Searchable Encryption
- Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, Kazuki Yoneyama:
UC-Secure Dynamic Searchable Symmetric Encryption Scheme. 73-90 - Takato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai, Tatsuji Munaka:
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes. 91-110 - Hiroaki Yamamoto:
Secure Automata-Based Substring Search Scheme on Encrypted Data. 111-131
Cryptanalysis
- Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Related-Key Impossible Differential Analysis of Full Khudra. 135-146 - Zejun Xiang, Wentao Zhang, Dongdai Lin:
On the Division Property of Simon48 and Simon64. 147-163 - Momonari Kudo, Junpei Yamaguchi, Yang Guo, Masaya Yasuda:
Practical Analysis of Key Recovery Attack Against Search-LWE Problem. 164-181 - Alessandro Barenghi, Gerardo Pelosi:
A Note on Fault Attacks Against Deterministic Signature Schemes. 182-192
Permutation and Symmetric Encryption
- Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka:
Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes. 195-211
Privacy Preserving
- Tao Zhang, Sherman S. M. Chow, Zhe Zhou, Ming Li:
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. 215-233 - Denis Butin, Denise Demirel, Johannes Buchmann:
Formal Policy-Based Provenance Audit. 234-253 - Filipe Beato, Kimmo Halunen, Bart Mennink:
Recipient Privacy in Online Social Networks. 254-264
Hardware Security
- Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, Kazuo Sakiyama:
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants. 267-285
Post-quantum Cryptography
- Wenbin Zhang, Chik How Tan:
On the Security and Key Generation of the ZHFE Encryption Scheme. 289-304 - Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction. 305-315
Paring Computation
- Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama:
Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation. 319-334
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.