Information Security Practice and Experience最新文献

筛选
英文 中文
Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook 你好,Facebook !这里是潜行者的天堂!: Facebook上使用电话号码的枚举攻击设计与分析
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_41
Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, S. Schrittwieser
{"title":"Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook","authors":"Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, S. Schrittwieser","doi":"10.1007/978-3-319-72359-4_41","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_41","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131403739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption 基于整数向量同态加密的HOG特征保密性提取
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_6
Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang
{"title":"Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption","authors":"Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang","doi":"10.1007/978-3-319-72359-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_6","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131770742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Generic Framework for Attribute-Based Group Signature 基于属性的群签名通用框架
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_51
Veronika Kuchta, G. Sharma, R. Sahu, O. Markowitch
{"title":"Generic Framework for Attribute-Based Group Signature","authors":"Veronika Kuchta, G. Sharma, R. Sahu, O. Markowitch","doi":"10.1007/978-3-319-72359-4_51","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_51","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131018776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics 一种安全实用的区块链生物特征签名方案
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_55
Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, M. Nishigaki
{"title":"A Secure and Practical Signature Scheme for Blockchain Based on Biometrics","authors":"Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, M. Nishigaki","doi":"10.1007/978-3-319-72359-4_55","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_55","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"473 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133142822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System eyeesec:一种实用的抗肩部冲浪注视认证系统
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_26
Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu
{"title":"EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System","authors":"Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu","doi":"10.1007/978-3-319-72359-4_26","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_26","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129489210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper) 云计算中MTD技术组合的有效安全性分析(短论文)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_32
Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang
{"title":"Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper)","authors":"Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang","doi":"10.1007/978-3-319-72359-4_32","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_32","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing 基于支持密码修改的智能卡的增强远程密码认证密钥协议
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_27
Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun
{"title":"Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing","authors":"Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun","doi":"10.1007/978-3-319-72359-4_27","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_27","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134509739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications 轻量级应用中基于在线排列的AE方案优化
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_13
Yu Sasaki, K. Yasuda
{"title":"Optimizing Online Permutation-Based AE Schemes for Lightweight Applications","authors":"Yu Sasaki, K. Yasuda","doi":"10.1007/978-3-319-72359-4_13","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_13","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Security of In-Vehicle Hybrid Network: Status and Challenges 车载混合动力网络的安全性:现状与挑战
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_38
Tianxiang Huang, Jianying Zhou, Yi (Estelle) Wang, A. Cheng
{"title":"On the Security of In-Vehicle Hybrid Network: Status and Challenges","authors":"Tianxiang Huang, Jianying Zhou, Yi (Estelle) Wang, A. Cheng","doi":"10.1007/978-3-319-72359-4_38","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_38","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Linearly Homomorphic Signatures with Designated Entities 具有指定实体的线性同态签名
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_22
Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shaojun Yang
{"title":"Linearly Homomorphic Signatures with Designated Entities","authors":"Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shaojun Yang","doi":"10.1007/978-3-319-72359-4_22","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_22","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128034668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信