ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2017 ISEA Asia Security and Privacy (ISEASP)
Latest Publications
TOTAL DOCUMENTS
24
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By IEEE
9781509059423
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Message from the technical program chairs
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976978
◽
2017
◽
Keyword(s):
Technical Program
Download Full-text
Cryptanalysis of NTRU with n public keys
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976980
◽
2017
◽
Cited By ~ 3
Author(s):
Sonika Singh
◽
Sahadeo Padhye
Keyword(s):
Public Keys
Download Full-text
AndroTaint: An efficient android malware detection framework using dynamic taint analysis
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976989
◽
2017
◽
Cited By ~ 6
Author(s):
Venkatesh Gauri Shankar
◽
Gaurav Somani
◽
Manoj Singh Gaur
◽
Vijay Laxmi
◽
Mauro Conti
Keyword(s):
Malware Detection
◽
Taint Analysis
◽
Android Malware
◽
Android Malware Detection
Download Full-text
Information gain score computation for N-grams using multiprocessing model
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976984
◽
2017
◽
Author(s):
C.D. Jaidhar
Keyword(s):
Information Gain
◽
Gain Score
Download Full-text
[Front cover]
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976975
◽
2017
◽
Keyword(s):
Front Cover
Download Full-text
Efficient weighted threshold ECDSA for securing bitcoin wallet
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976994
◽
2017
◽
Cited By ~ 7
Author(s):
Pratyush Dikshit
◽
Kunwar Singh
Download Full-text
A2BSE: Anonymous attribute based searchable encryption
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976986
◽
2017
◽
Cited By ~ 1
Author(s):
Payal Chaudhari
◽
Manik Lal Das
Keyword(s):
Searchable Encryption
Download Full-text
Conference program
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976979
◽
2017
◽
Keyword(s):
Conference Program
Download Full-text
To get optimal bound of annihilator immunity by heuristic technique
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976987
◽
2017
◽
Author(s):
Rajni Goyal
◽
Anupama Panigrahi
Keyword(s):
Optimal Bound
◽
Heuristic Technique
Download Full-text
Towards detecting fake user accounts in facebook
2017 ISEA Asia Security and Privacy (ISEASP)
◽
10.1109/iseasp.2017.7976996
◽
2017
◽
Cited By ~ 9
Author(s):
Aditi Gupta
◽
Rishabh Kaushal
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close