default search action
15th AsiaJCIS 2020: Taipei, Taiwan
- 15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020. IEEE 2020, ISBN 978-1-7281-9922-1
- Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. 1-8 - Chun-I Fan, Yi-Fan Tseng, Yen-Lin Huang:
Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map. 9-15 - Masayuki Yoshino, Ken Naganuma, Noboru Kunihiro, Hisayoshi Sato:
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption. 16-23 - Masayuki Fukumitsu, Shingo Hasegawa:
Linear Lossy Identification Scheme derives Tightly-Secure Multisignature. 24-31 - Ken Naganuma, Masayuki Yoshino, Atsuo Inoue, Yukinori Matsuoka, Mineaki Okazaki, Noboru Kunihiro:
Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs. 32-39 - Chih-Hung Wang, Guo-Cyuan Mao:
Secure and flexible algorithm for outsourcing of bilinear pairings effectively resisting conspiracy. 40-45 - Hector B. Hougaard, Atsuko Miyaji:
SIT: Supersingular Isogeny Tree-based Group Key Exchange. 46-53 - Ken Naganuma, Takayuki Suzuki, Masayuki Yoshino, Kenta Takahashi, Yosuke Kaga, Noboru Kunihiro:
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature. 54-58 - Chien-Lung Hsu, Tuan-Vinh Le:
A Time Bound Dynamic Group key Distribution Scheme with Anonymous Three-factor Identification for IoT-Based Multi-Server Environments. 59-65 - Yun-Hsin Chuang, Chin-Laung Lei, Hung-Jr Shiu:
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines. 66-73 - Aram Jivanyan, Tigran Mamikonyan:
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures. 74-81 - Hsiang-Chen Hsu, Zi-Yuan Liu, Raylin Tso, Kung Chen:
Multi-value Private Information Retrieval using Homomorphic Encryption. 82-88 - Atsuko Miyaji, Yoshitaka Nagao:
Privacy Preserving Data Integration Protocol. 89-96 - Peter Shaojui Wang, Pin-Yen Huang, Yu-An Tsai, Raylin Tso:
An Enhanced Mondrian Anonymization Model based on Self-Organizing Map. 97-100 - Shuji Yamaguchi, Hidehito Gomi, Ryosuke Kobayashi, Tran Phuong Thao, Mhd Irvan, Rie Shigetomi Yamaguchi:
Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data. 101-109 - Wen-Chung Kuo, Wan-Hsuan Kao, Chun-Cheng Wang, Yu-Chih Huang:
3D-Playfair Encrypted Message Verification Technology based on MD5. 110-114 - Chia-Mei Chen, Tien-Ho Chang, Gu Hsin Lai:
The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units. 115-120 - Meng-Hsuan Tsai, Yu-Cheng Hsu, Nai-Wei Lo:
An Efficient Blockchain-based Firmware Update Framework for IoT Environment. 121-127 - Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Bo Sun, Tao Ban, Takeshi Takahashi, Ting-Wei Wu, Shang-Wei Kao:
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing. 128-136 - Hiroki Nishikawa, Takumi Yamamoto, Bret A. Harsham, Ye Wang, Kota Uehara, Chiori Hori, Aiko Iwasaki, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of Malicious Email Detection using Cialdini's Principles. 137-142 - Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
IoT-Malware Detection Based on Byte Sequences of Executable Files. 143-150 - Younghwan Kim, Huy Kang Kim:
Anomaly Detection using Clustered Deep One-Class Classification. 151-157
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.