English  简体中文
搜索   
首页 中心概况 新闻动态 科研成果 研究队伍 技术园地 公共信息 联系我们

2016年会议论文


2017-04-16       


1.   Bo Chen, Shijie Jia, Luning Xia, Peng Liu: Sanitizing Data is Not Enough! Towards Sanitizing Structural Artifacts in Flash Media. Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC 2016), pp 496-507. 5-8 December, 2016, USA. CCF-B类.

2.   Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue: (Deterministic) Hierarchical Identity-Based Encryption from Learning with Rounding over Small Modulus. Proceedings of 11th ACM Asia Conference on Computer and Communications Security   (ASIACCS2016), pp 907-912, 30 May-3 June, 2016, Xi'an, China. EI, CCF-C类.

3.   Chong Guan, Kun Sun, Zhan Wang, Wentao Zhu: Privacy Breach by Exploiting Post Message in HTML5: Identification, Evaluation, and Countermeasure. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS 2016), pp 629-640, 30 May-3 June, 2016, Xi'an, China. EI, CCF-C类.

4.   Xiaoyang He, Wei Yu, Kunpeng Wang: Hashing into Generalized Huff Curves. Proceedings of 11th International Conference on Information Security and Cryptology (Inscrypt 2015), LNCS 9589, pp 22-44, 1-3 November, 2015, Beijing, Springer: Publishing Date: 7 May, 2016. EI, IIE-C类.

5.   Yafei Ji, Luning Xia: Improved Chameleon: A Lightweight Method for Identity Verification in Near Field Communication. Proceedings of 2016 IEEE International Symposium on Computer, Consumer and Control (IS3C 2016), pp 387-392, 4-6 July, 2016, Xi'an, China.

6.   Dingding Jia, Xianhui Lu, Bao Li: Receiver Selective Opening Security from Indistinguishability Obfuscation. Proceedings of 17th International Conference on Cryptology (Indocrypt 2016), LNCS 10095, pp 393-410, 11-14 December, 2016, India, Springer: Publishing Date: 11 November, 2016. EI, IIE-C类.

7.   Shijie Jia, Luning Xia, Bo Chen, Peng Liu: NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS 2016), pp 305-315, 30 May-3 June, 2016, Xi'an, China. EI, CCF-C类.

8.   Wenpan Jing, Xianhui Lu, Bao Li: Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation. Proceedings of 12th International Conference on Information Security and Cryptology (Inscrypt 2016), LNCS 10143, pp 291-308, 4-6 November, 2016, Beijing, Springer: Publishing Date: 3 March, 2017. EI, IIE-C类.

9.   Zhining Lang, Xiaozhuo Gu, Zhou Quan, Taizhong Xu: Combining Statistics-Based and CNN-Based Information for Sentence Classification. IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI 2016), IEEE, pp 1012 – 1018, 6-8 November, 2016, USA. EI, CCF-C类.

10. Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin: Towards Efficient Re-encryption for Secure Client-side Deduplication in Public Clouds. Proceedings of 18th International Conference on Information and Communications Security (ICICS 2016). LNCS 9977, pp 71-84, 29 November-2 December, 2016, Singapore, Springer: Publishing Date: 25 November, 2016. EI, CCF-C类.

11. Weixuan Li, Wei Yu, Kunpeng Wang: Improved Tripling on Elliptic Curves. Proceedings of 11th International Conference on Information Security and Cryptology (Inscrypt 2015), LNCS 9589, pp 193-205, 1-3 November, 2015, Beijing, Springer: Publishing Date: 7 May, 2016. EI, IIE-C类.

12. Yamin Liu, Xianhui Lu, Bao Li, Wenpan Jing, Fuyang Fang: Approximate-Deterministic Public Key Encryption from Hard Learning Problems. Proceedings of 17th International Conference on Cryptology (Indocrypt 2016), LNCS 10095, pp 25-42, 11-14 December, 2016, India, Springer: Publishing Date: 11 November, 2016. EI, IIE-C类.

13.  Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue: Lossy Key Encapsulation Mechanism and Its Applications. Proceedings of 19th International Conference on Information Security and Cryptology (ICISC 2016), LNCS 10157, pp 126-144, 30 November-2 December, 2016, Seoul, Springer: Publishing Date: 9 February, 2017. EI, IIE-C类.

14. Zeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, Yuan Zhao:Leakage Fingerprints — A Non-negligible Vulnerability in Side – Channel Analysis. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS 2016), pp 807-818, 30 May-3 June, 2016, Xi'an, China. EI, CCF-C类.

15. Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma, Zongbin Liu:Detecting Side Channel Vulnerabilities in Improved Rotating S-box Masking Scheme-Presenting Four Non-profiled Attacks. The 23rd Conference on Selected Areas in Cryptography (SAC 2016), 10-12 August, 2016, Canada. CCF-C类.

16. Kewei Lv, Wenjie Qin , Ke Wang: Improved Security Proof for Modular Exponentiation Bits. Proceedings of 10th International Conference on Network and System Security (NSS 2016), LNCS 9955, pp 509-516, 28-30 September, 2016, Taipei, Springer: Publishing Date: 21 September, 2016. EI.

17. Kewei Lv, Si-wei Ren, Wenjie Qin: The Security of Individual Bit for XTR. Proceedings of 18th International Conference on Information and Communications Security (ICICS 2016), LNCS 9977, pp 87-98, 29 November-2 December, 2016, Singapore, Springer: Publishing Date: 25 November, 2016. EI, CCF-C类.

18. Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin: Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. Proceedings of 18th International Conference on Information and Communications Security (ICICS 2016). LNCS 9977, pp 292-306, 29 November-2 December, 2016, Singapore, Springer: Publishing Date: 25 November, 2016. EI, CCF-C类.

19. Shiran Pan, Shen Yan, Wentao Zhu: Security Analysis on Privacy – Preserving Cloud Aided Biometric Identification Schemes. Proceedings of 21st Australasian Conference on Information Security and Privacy (ACISP 2016). LNCS 9723, pp 446-453, 4-6 July, 2016, Australia, Springer: Publishing Date: 30 June, 2016. EI, CCF-C类.

20. Liqiang Peng, Lei Hu, Yao Lu: Improved Results on Cryptanalysis of Prime Power RSA. Proceedings of 19th International Conference on Information Security and Cryptology (ICISC 2016), LNCS 10157, pp 287-303, 30 November-2 December, 2016, Seoul, Springer: Publishing Date: 9 February, 2017. EI, IIE-C类.

21. Kexin Qiao, Lei Hu, Siwei Ren: Differential Security Evaluation of Simeck with Dynamic Key-Guessing Techniques. Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), pp 74-84, 19-21 February, 2016, Italy. EI.

22. Danping Shi, Lei Hu, Siwei Ren, Ling Song: Linear(hull) Cryptanalysis of Round-Reduced Versions of KATAN. Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), pp 364-371, 19-21 February, 2016, Italy. EI.

23. Ling Song, Zhangjie Huang, Qianqian Yang: Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA. Proceedings of 21st Australasian Conference on Information Security and Privacy (ACISP2016), LNCS 9723, pp 379-394, 4-6 July, 2016, Australia, Springer: Publishing Date:  30 June, 2016. EI, CCF-C类.

24. Liping Wang, Daqing Wan: On Lattice-Based Algebraic Feedback Shift Registers Synthesis for Multi-sequences. Cryptography and Communications (SETA 2016), pp 1-11, 9-14 October, 2016, Springer: Publishing Date: 29 May, 2017.

25. Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng: Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications. Proceedings of 23rd International Conference on Fast Software Encryption (FSE 2016), LNCS 9783, pp 514-532, 20-23 March, 2016, Germany, Springer: Publishing Date: 20 July, 2016. EI, CCF-B类.

26. Wenwen Wang, Kewei Lv: The Variant of Remote Set Problem on Lattices. Proceedings of 18th International Conference on Information and Communications Security (ICICS 2016), LNCS 9977, pp 124-133, 29 November-2 December, 2016, Singapore, Springer: Publishing Date: 25 November, 2016. EI, CCF-C类.

27. Wenwen Wang, Kewei Lv: Covering Radius Problem, Successive Minima of Lattices. Proceedings of 2nd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS2016), 2-4 December, 2016.

28. Wenwen Wang, Kewei Lv: On Promise Problem of the Generalized Shortest Vector Problem. Proceedings of 17th International Conference on Information and Communications Security (ICICS 2015), LNCS 9543, pp 37-49, 9-11 December, 2015, Beijing, Springer: Publishing Date: 5 March, 2016. EI, CCF-C类.

29. Yao Wang, Kewei Lv: The Security of Polynomial Information of Diffie-Hellman Key. Proceedings of 17th International Conference on Information and Communications Security (ICICS 2015), LNCS 9543, pp 71-81, 9-11 December, 2015, Beijing, Springer: Publishing Date: 5 March, 2016. EI, CCF-C类.

30. Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng: Cryptanalysis of Multi-Prime Phi-Hiding Assumption. Proceedings of 19th International Conference on Information Security (ISC 2016), LNCS 9866, pp 440-453, 3-6 September, 2016, USA, Springer: Publishing Date: 26 August, 2016. EI, CCF-C类.

31. Jun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng, Zhangjie Huang: Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication. Proceedings of 19th International Conference on Information Security (ISC 2016), LNCS 9866, pp 48-58, 3-6 September, 2016, USA, Springer: Publishing Date: 26 August, 2016. EI, CCF-C类.

32. Xiu Xu, Wei Yu, Kunpeng Wang, Xiaoyang He: Constructing Isogenies on Extended Jacobi Quartic Curves. Proceedings of 12th International Conference on Information Security and Cryptology (Inscrypt 2016), LNCS 10143, pp 416-427, 4-6 November, 2016, Beijing, Springer: Publishing Date: 3 March, 2017. EI, IIE-C类.

33. Shen Yan, Shiran Pan, Yuhang Zhao, Wentao Zhu: Towards Privacy-Preserving Data Mining in Online Social Networks:   Distance-Grained and Item-Grained Differential Privacy. Proceedings of 21st Australasian Conference on Information Security and Privacy (ACISP 2016). LNCS 9722, pp 141-157, 4-6 July 2016, Australia, Springer: Publishing Date: 30 June, 2016. EI, CCF-C类.

34. Shen Yan, Shiran Pan, Wentao Zhu: DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-aware Differential Privacy. Proceedings of 18th International Conference on Information and Communications Security (ICICS 2016). LNCS 9977, pp 347-357, 29 November-2 December, 2016, Singapore, Springer: Publishing Date: 25 November, 2016. EI, CCF-C类.

35. Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing: Extracting More Entropy for TRNGs Based on the Coherent Sampling. 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016). CCF-C类.

36. Ling Yang, Fuyang FangXianhui LuWen Tao ZhuQiongxiao WangShen YanShiran Pan: A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016). CCF-C类.

37. Qianqian Yang, Lei Hu, Siwei Sun, Ling Song: Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. Proceedings of 10th International Conference on Network and System Security (NSS 2016), LNCS 9955, pp 398-411, 28-30 September, 2016, Taipei, Springer: Publishing Date: 21 September, 2016. EI.

38. Qianqian Yang, Lei Hu, Siwei Sun, Ling Song: Related-Key Impossible Differential Analysis of Full Khudra. Proceedings of 11th International Workshop on Security (IWSEC 2016), LNCS 9836, pp 135-146, 12-14 September, 2016, Japan, Springer: Publishing Date: 9 September, 2016. EI, IIE-C类.

39. Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian: Deterministic Encoding into Twisted Edwards Curves. Proceedings of 21st Australasian Conference on Information Security and Privacy (ACISP2016), LNCS 9723, pp 285-297, 4-6 July, 2016, Australia, Springer: Publishing Date:  30 June. 2016. EI, CCF-C类.

40. Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji: Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting. Proceedings of 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. IEEE TrustCom/BigDataSE/ISPA 2016, pp 292-300, 23-26 August, 2016, Tianjin, China. EI, CCF-C类.

41. Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji: Physical-layer Identification of HF RFID Cards Based on RF Fingerprinting. Proceedings of 12th International Conference on Information Security Practice and Experience (ISPEC 2016). LNCS 10060, pp 284-299, 16-18 November, 2016, Zhangjiajie, China, Springer: Publishing Date: 5 November, 2016. EI.

42. Xiaona Zhang, Li-Ping Wang: Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial. Proceedings of 12th International Conference on Information Security and Cryptology (Inscrypt 2016), LNCS 10143, pp 357-366, 4-6 November, 2016, Beijing, Springer: Publishing Date: 3 March, 2017. EI, IIE-C类.

43. Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma: RegRSA: Using Registers as Buers to Resist Memory Disclosure Attacks. Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2016), IFIPAICT 471, pp 293-307, 30 May-1 June, 2016, Belgium, Springer: Publishing Date: 11 May, 2016. EI, CCF-C类.

44. Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng: PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA. The 23rd Conference on Selected Areas in Cryptography (SAC 2016), 10-12 August, 2016, Canada. CCF-C类.

45. Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun: A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. Proceedings of 18th International Conference on Information and Communications Security (ICICS 2016). LNCS 9977, pp 37-36, 29 November-2 December, 2016, Singapore, Springer: Publishing Date: 25 November, 2016. EI, CCF-C类.

46. Shuangyi Zhu, Yuan Ma,Jingqiang Lin, Jia Zhuang, Jiwu Jing: More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22. Proceedings of 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt 2016), LNCS 10031, pp 307-329, 4-8 December, 2016, Vietnam, Springer: Publishing Date: 9 November, 2016. CCF-B类.

47. 侯岳晗,蔡权伟,李伟,江芳杰,林璟锵: 高速密码服务器测试系统的设计与实现. 中国信息和通信安全学术会议(CCICS’2016),2016年11月19-20日。

48. 李梁磊,高能,刘宗斌: 面向泛在网络的CA-RBAC访问控制研究. 2016 年全国电子认证技术交流大会(CICA2016). 2016 年6 月22 日-25日。

49. 林晓锋,常欢,张令臣: 基于Shadow DOM的口令保护. 2016 年全国电子认证技术交流大会(CICA2016). 2016 年6 月22 日-25日。

50. 刘学芬、孙荣辛、夏鲁宁、李伟:面向MySQL的合规性安全隐患检测方法研究. 第31次全国计算机交流大会, 信息网络安全,2016(9), 1-5。

51. 马振国,向继,李丹仪,任丽月: 基于UKey的全加密硬盘的设计与实现. 2016 年全国电子认证技术交流大会(CICA2016). 2016 年6 月22 日-25日。

52. 孙长辉,张令臣,李一鸣: 基于主机认证的多服务负载均衡系统设计. 2016 年全国电子认证技术交流大会(CICA2016). 2016 年6 月22 日-25日。

53. 汤胜军,贾世杰,夏鲁宁:基于位置跳变的闪存数据安全存储方法. 2016 年全国电子认证技术交流大会(CICA2016). 2016 年6 月22 日-25日。

54. 祖红磊,张令臣: 利用Application Cache的一种新的攻击模型. 2016 年全国电子认证技术交流大会(CICA2016). 2016 年6 月22 日-25日。

55. 周玉晶,沈嘉荟,邱海韬,查达仁:基于复杂网络的社交媒体内容安全可视化分析系统,第31次全国计算机安全学术交流会,信息网络安全,2016(9), 158-162。

 


评论人:          
lois.local\

中国科学院DCS中心版权所有
地址:北京市海淀区闵庄路甲89号 4号楼
联系电话:010-82546536 010-82546537
京ICP备05046059号