Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, S. Schrittwieser
{"title":"Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook","authors":"Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, S. Schrittwieser","doi":"10.1007/978-3-319-72359-4_41","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_41","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131403739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption","authors":"Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang","doi":"10.1007/978-3-319-72359-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_6","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131770742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Veronika Kuchta, G. Sharma, R. Sahu, O. Markowitch
{"title":"Generic Framework for Attribute-Based Group Signature","authors":"Veronika Kuchta, G. Sharma, R. Sahu, O. Markowitch","doi":"10.1007/978-3-319-72359-4_51","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_51","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131018776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, M. Nishigaki
{"title":"A Secure and Practical Signature Scheme for Blockchain Based on Biometrics","authors":"Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, M. Nishigaki","doi":"10.1007/978-3-319-72359-4_55","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_55","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"473 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133142822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang
{"title":"Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper)","authors":"Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang","doi":"10.1007/978-3-319-72359-4_32","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_32","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Online Permutation-Based AE Schemes for Lightweight Applications","authors":"Yu Sasaki, K. Yasuda","doi":"10.1007/978-3-319-72359-4_13","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_13","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tianxiang Huang, Jianying Zhou, Yi (Estelle) Wang, A. Cheng
{"title":"On the Security of In-Vehicle Hybrid Network: Status and Challenges","authors":"Tianxiang Huang, Jianying Zhou, Yi (Estelle) Wang, A. Cheng","doi":"10.1007/978-3-319-72359-4_38","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_38","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}