ICICS accepted list 2012.doc
上传人:sy****28 上传时间:2024-09-14 格式:DOC 页数:9 大小:19KB 金币:18 举报 版权申诉
预览加载中,请您耐心等待几秒...

ICICS accepted list 2012.doc

ICICSacceptedlist2012.doc

预览

在线预览结束,喜欢就下载吧,查找使用更方便

18 金币

下载此文档

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

FullPapersJunXu,HuLeiandSiweiSun.ImplicitPolynomialRecoveryandCryptanalysisofACombinatorialKeyCryptosystem中科院MiaoLi,LiangshengHe,TongjieYangandXiaohuiYang.AnEfficientReconfigurableII-ONBModularMultiplier解放军信息工程大学JingweiLi,ChunfuJiaandJinLi.OutsourcingtheEncryptionofAttribute-basedEncryptioninCloudComputing南开贾春福WilkoHenecka,NigelBeanandMatthewRoughan.Conversionofreal-numberedprivacy-preservingproblemsintotheintegerdomainNingDingandDawuGu.OnConstant-RoundPreciseZero-Knowledge上海交大HYPERLINK"http://acm.sjtu.edu.cn/%E7%8F%AD%E7%BA%A7%E4%BB%8B%E7%BB%8D/%E4%BB%BB%E8%AF%BE%E6%95%99%E5%B8%88/%E5%B8%B8%E4%BB%BB%E6%95%99%E5%B8%88/%E8%B0%B7%E5%A4%A7%E6%AD%A6"\t"_blank"谷大武Yang-WaiChow,WillySusiloandDuncanWong.EnhancingthePerceivedVisualQualityofaSizeInvariantVisualCryptographySchemeDjebbarFatihaandAyadBeghdad.AudioSteganalysisBasedOnLosslessData-CompressionTechniquesShushengLiu,ZhengGongandLibinWang.ImprovedRelated-KeyDifferentialAttacksonReduced-RoundLBlock上海交大王立斌ZouheirTrabelsi,LirenZhangandSafaaZeidan.FirewallPacketFilteringOptimizationusingStatisticalTrafficAwarenessTestRuoxuZhao,DawuGu,JuanruLiandHuiLiu.DetectingEncryptionFunctionsviaProcessEmulationandIL-basedProgramAnalysis上海交大JiaweiZhu,ZhiGuan,YangYang,LiangwenYu,HuipingSunandZhongChen.Permission-BasedAbnormalApplicationDetectionforAndroid北大陈钟RicardoCorinandFelipeAndresManzano.TaintAnalysisofSecurityCodeintheKLEEsymbolicexecutionengineYangWang,ManHoAuandWillySusilo.PerfectAmbiguousOptimisticFairExchangeCarlosGañán,OscarEsparza,JoséL.Muñoz,JorgeMataDíazandJuanjoAlins.ImpactoftherevocationserviceinPKIpricesHaoXiong,CongZhang,TszHonYuen,EchoP.ZhangandS.M.Yiu.ContinualLeakage-ResilientDynamicSecretSharingRajaNaeemAkram,KonstantinosMarkantonakisandKeithMayes.CoopetitiveArchitecturetoSupportaDynamicandScalableNFCbasedMobileServicesArchitectureXiaoqiongPangandBoYang.Privacy-PreservingNoisyKeywordSearchinCloudComputingTszHonYuen,JosephLiu,XinyiHuang,ManHoAu,WillySusiloandJianyingZhou.ForwardSecureAttribute-BasedSignatureAts