Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperMay 2016
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications SecurityPages 919–924https://doi.org/10.1145/2897845.2897924We present RamCrypt, a solution that allows unmodified Linux processes to transparently work on encrypted data. RamCrypt can be deployed and enabled on a per-process basis without recompiling user-mode applications. In every enabled process, data is ...
- research-articleMay 2016
Forgery-Resistant Touch-based Authentication on Mobile Devices
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications SecurityPages 499–510https://doi.org/10.1145/2897845.2897908Mobile devices store a diverse set of private user data and have gradually become a hub to control users' other personal Internet-of-Things devices. Access control on mobile devices is therefore highly important. The widely accepted solution is to ...
- research-articleMay 2016
Efficient Authenticated Multi-Pattern Matching
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications SecurityPages 593–604https://doi.org/10.1145/2897845.2897906Multi-pattern matching compares a large set of patterns against a given query string, which has wide application in various domains such as bio-informatics and intrusion detection. This paper shows how to authenticate the classic Aho-Corasick multi-...
- research-articleMay 2016
Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS)
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications SecurityPages 841–852https://doi.org/10.1145/2897845.2897893Affordable cloud computing technologies allow users to efficiently store, and manage their Personal Health Records (PHRs) and share with their caregivers or physicians. This in turn improves the quality of healthcare services, and lower health care cost. ...
- research-articleMay 2016
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications SecurityPages 59–70https://doi.org/10.1145/2897845.2897846To secure cloud storage and enforce access control, data encryption has become essential, given the ever increasing cyber threat everywhere. Attribute-based Encryption (ABE) crypto systems are widely considered as a promising solution under such a ...