Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Image document

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation

Huabiao Lu , Baokang Zhao , Xiaofeng Wang , Jinshu Su
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.271-284, ⟨10.1007/978-3-642-36818-9_28⟩
Conference papers hal-01480181v1
Image document

Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control

Chengjun Wang , Baokang Zhao , Wanrong Yu , Chunqing Wu , Zhenghu Gong
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.488-500, ⟨10.1007/978-3-642-32498-7_37⟩
Conference papers hal-01542435v1
Image document

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution

Bo Liu , Bo Liu , Baokang Zhao , Dingjie Zou , Chunqing Wu , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers hal-01480204v1