Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

11 results
Image document

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

Xingxing Xie , Hua Ma , Jin Li , Xiaofeng Chen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers hal-01480196v1
Image document

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Yinghui Zhang , Hui Li , Xiaoqing Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers hal-01480197v1
Image document

BAAP: A Behavioral Animation Authoring Platform for Emotion Driven 3D Virtual Characters

Ling Li , Gengdai Liu , Mingmin Zhang , Zhigeng Pan , Edwin Song
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.350-357, ⟨10.1007/978-3-642-15399-0_37⟩
Conference papers hal-01055625v1
Image document

A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems

Ahmed Kheldoun , Kamel Barkaoui , Jiafeng Zhang , Malika Ioualalen
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.551-562, ⟨10.1007/978-3-319-19578-0_45⟩
Conference papers hal-01789937v1
Image document

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors

Yuchao She , Hui Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers hal-01480185v1
Image document

CSP-Based General Detection Model of Network Covert Storage Channels

Hui Zhu , Tingting Liu , Guanghui Wei , Beishui Liu , Hui Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers hal-01480205v1
Image document

Attribute-Based Fine-Grained Access Control with User Revocation

Jun Ye , Wujun Zhang , Shu-Lin Wu , Yuan-Yuan Gao , Jia-Tao Qiu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.586-595, ⟨10.1007/978-3-642-55032-4_60⟩
Conference papers hal-01397274v1
Image document

An Effective Cloud-Based Active Defense System against Malicious Codes

Zhenyu Zhang , Wujun Zhang , Jianfeng Wang , Xiaofeng Chen
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.690-695, ⟨10.1007/978-3-642-55032-4_71⟩
Conference papers hal-01397288v1

Network and Parallel Computing

Guang R. Gao , Depei Qian , Xinbo Gao , Barbara Chapman , Wenguang Chen
Springer International Publishing, LNCS-9966, 2016, Lecture Notes in Computer Science, 978-3-319-47098-6. ⟨10.1007/978-3-319-47099-3⟩
Books hal-01648008v1
Image document

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet

Tao Jiang , Xiaofeng Chen , Jin Li , Jianfeng Ma
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.612-621, ⟨10.1007/978-3-642-55032-4_63⟩
Conference papers hal-01397277v1
Image document

Secure and Verifiable Outsourcing of Sequence Comparisons

Yansheng Feng , Hua Ma , Xiaofeng Chen , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.243-252, ⟨10.1007/978-3-642-36818-9_25⟩
Conference papers hal-01480179v1