Perfect Ambiguous Optimistic Fair Exchange (Englisch)
- Neue Suche nach: Wang, Y.
- Neue Suche nach: Au, M.H.
- Neue Suche nach: Susilo, W.
- Neue Suche nach: Wang, Y.
- Neue Suche nach: Au, M.H.
- Neue Suche nach: Susilo, W.
- Neue Suche nach: Chim, Tat Wing
- Neue Suche nach: Yuen, Tsz Hon
In:
Information and communications security: 14th international conference, ICICS 2012, Hong Kong, China, October 29-31 2012 : proceedings /
7618
;
142-153
;
2012
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Perfect Ambiguous Optimistic Fair Exchange
-
Beteiligte:Wang, Y. ( Autor:in ) / Au, M.H. ( Autor:in ) / Susilo, W. ( Autor:in ) / Chim, Tat Wing / Yuen, Tsz Hon
-
Kongress:14th, Information and communications security: 14th international conference, ICICS 2012, Hong Kong, China, October 29-31 2012 : proceedings / ; 2012 ; Hong Kong, China
-
Erschienen in:Information and communications security: 14th international conference, ICICS 2012, Hong Kong, China, October 29-31 2012 : proceedings / , 7618 ; 142-153LECTURE NOTES IN COMPUTER SCIENCE , 7618 ; 142-153
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2012
-
Format / Umfang:12 pages
-
Anmerkungen:Includes bibliographical references and index. Also issued online. ICICS 2012.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Audio Steganalysis Based on Lossless Data-Compression TechniquesDjebbar, F. / Ayad, B. et al. | 2012
- 10
-
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography SchemeChow, Y.-W. / Susilo, W. / Wong, D.S. et al. | 2012
- 22
-
Impact of the Revocation Service in PKI PricesGanan, C. / Munoz, J.L. / Esparza, O. / Mata-Diaz, J. / Alins, J. et al. | 2012
- 33
-
Cryptanalysis of Multi-Prime RSA with Small Prime DifferenceBahig, H.M. / Bhery, A. / Nassr, D.I. et al. | 2012
- 45
-
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key CryptosystemXu, J. / Hu, L. / Sun, S. et al. | 2012
- 58
-
Improved Related-Key Differential Attacks on Reduced-Round LBlockLiu, S. / Gong, Z. / Wang, L. et al. | 2012
- 70
-
Countermeasures on Application Level Low-Rate Denial-of-Service AttackTang, Y. et al. | 2012
- 81
-
Firewall Packet Filtering Optimization Using Statistical Traffic Awareness TestTrabelsi, Z. / Zhang, L. / Zeidan, S. et al. | 2012
- 93
-
Group Behavior Metrics for P2P Botnet DetectionFelix, J. / Joseph, C. / Ghorbani, A.A. et al. | 2012
- 105
-
Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGAMa, Y. / Xia, L. / Lin, J. / Jing, J. / Liu, Z. / Yu, X. et al. | 2012
- 119
-
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State ModelXiong, H. / Zhang, C. / Yuen, T.H. / Zhang, E.P. / Yiu, S.M. / Qing, S. et al. | 2012
- 131
-
Conversion of Real-Numbered Privacy-Preserving Problems into the Integer DomainHenecka, W. / Bean, N. / Roughan, M. et al. | 2012
- 142
-
Perfect Ambiguous Optimistic Fair ExchangeWang, Y. / Au, M.H. / Susilo, W. et al. | 2012
- 154
-
Privacy-Preserving Noisy Keyword Search in Cloud ComputingPang, X. / Yang, B. / Huang, Q. et al. | 2012
- 167
-
Forward Secure Attribute-Based SignaturesYuen, T.H. / Liu, J.K. / Huang, X. / Au, M.H. / Susilo, W. / Zhou, J. et al. | 2012
- 178
-
On Constant-Round Precise Zero-KnowledgeDing, N. / Gu, D. et al. | 2012
- 191
-
Outsourcing Encryption of Attribute-Based Encryption with MapReduceLi, J. / Jia, C. / Chen, X. et al. | 2012
- 202
-
Security Enhancement of Identity-Based Identification with ReversibilityFujioka, A. / Saito, T. / Xagawa, K. et al. | 2012
- 214
-
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services ArchitectureAkram, R.N. / Markantonakis, K. / Mayes, K. et al. | 2012
- 228
-
Permission-Based Abnormal Application Detection for AndroidZhu, J. / Guan, Z. / Yang, Y. / Yu, L. / Sun, H. / Chen, Z. et al. | 2012
- 240
-
Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted DataThing, V.L.L. / Tan, D.J.J. et al. | 2012
- 252
-
Detecting Encryption Functions via Process Emulation and IL-Based Program AnalysisZhao, R. / Gu, D. / Li, J. / Liu, H. et al. | 2012
- 264
-
Taint Analysis of Security Code in the KLEE Symbolic Execution EngineCorin, R. / Manzano, F.A. et al. | 2012
- 276
-
A Generic Approach for Providing Revocation Support in Secret HandshakeYang, Y. / Lu, H. / Weng, J. / Ding, X. / Zhou, J. et al. | 2012
- 285
-
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag PrivacyYang, A. / Zhuang, Y. / Wong, D.S. et al. | 2012
- 293
-
Exploring Mobile Proxies for Better Password AuthenticationSaxena, N. / Voris, J. et al. | 2012
- 303
-
On Security of Universal Hash Function Based Multiple AuthenticationAbidin, A. et al. | 2012
- 311
-
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's AttackLi, Z. / Lu, Y. / Wang, W. / Zhang, B. / Lin, D. et al. | 2012
- 321
-
Applying Time-Memory-Data Trade-Off to Plaintext Recovery AttackLi, Z. / Zhang, B. / Lu, Y. / Zou, J. / Lin, D. et al. | 2012
- 331
-
Comparison between Side-Channel Analysis DistinguishersMaghrebi, H. / Rioul, O. / Guilley, S. / Danger, J.-L. et al. | 2012
- 341
-
Acceleration of Composite Order Bilinear Pairing on Graphics HardwareZhang, Y. / Xue, C.J. / Wong, D.S. / Mamoulis, N. / Yiu, S.M. et al. | 2012
- 349
-
Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password SchemeMeng, Y. / Li, W. et al. | 2012
- 357
-
Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value DecompositionYong, L. / Meishan, H. / Bogang, L. et al. | 2012
- 365
-
Cookie-Proxy: A Scheme to Prevent SSLStrip AttackZhao, S. / Wang, D. / Yang, W. / Ma, C. et al. | 2012
- 373
-
Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet ExplorerDai, T. / Sathyanarayan, S. / Yap, R.H.C. / Liang, Z. et al. | 2012
- 381
-
Endpoint Mitigation of DDoS Attacks Based on Dynamic ThresholdingKim, D. / Kim, B. / Kim, I. / Kim, J. / Cho, H. et al. | 2012
- 392
-
Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit DistanceCao, Y. / Wei, Q. / Wang, Q. et al. | 2012
- 400
-
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply ChainsXin, W. / Sun, H. / Yang, T. / Guan, Z. / Chen, Z. et al. | 2012
- 408
-
Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based CryptographyZhang, Y. / Feng, D. et al. | 2012
- 416
-
F^5P^5: Keyword Search over Encrypted Data with Five Functions and Five Privacy AssurancesShuai, H. / Zhu, W.T. et al. | 2012
- 427
-
Location Privacy Policy Management SystemMuhammed, A. / Lin, D. / Squicciarini, A. et al. | 2012
- 435
-
Privacy Protection in Social Networks Using l-DiversityYu, L. / Zhu, J. / Wu, Z. / Yang, T. / Hu, J. / Chen, Z. et al. | 2012
- 445
-
Selling Power Back to the Grid in a Secure and Privacy-Preserving MannerChim, T.W. / Yiu, S.M. / Hui, L.C.K. / Li, V.O.K. / Mui, T.W. / Tsang, Y.H. / Kwok, C.K. / Yu, K.Y. et al. | 2012
- 453
-
A Key Sharing Fuzzy Vault SchemeYou, L. / Fan, M. / Lu, J. / Wang, S. / Li, F. et al. | 2012
- 461
-
A New Version of McEliece PKC Based on Convolutional CodesLondahl, C. / Johansson, T. et al. | 2012
- 471
-
Flexible Attribute-Based EncryptionArita, S. et al. | 2012
- 479
-
Non-interactive Dynamic Identity-Based Broadcast Encryption without Random OraclesRen, Y. / Wang, S. / Zhang, X. et al. | 2012
- 488
-
A Comparative Study of Malware Family ClassificationIslam, R. / Altas, I. et al. | 2012
- 497
-
A Fine-Grained Classification Approach for the Packed Malicious CodeGuo, S. / Li, S. / Yu, Y. / Hu, A. / Ban, T. et al. | 2012