Information Security Practice and Experience最新文献

筛选
英文 中文
Designing a Code Vulnerability Meta-scanner 设计一个代码漏洞元扫描器
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_11
Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, I. Borne
{"title":"Designing a Code Vulnerability Meta-scanner","authors":"Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, I. Borne","doi":"10.1007/978-3-030-34339-2_11","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_11","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121799435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE 来自RLWE的可证明安全的基于密码的三方认证密钥交换
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_4
Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You
{"title":"Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE","authors":"Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You","doi":"10.1007/978-3-030-34339-2_4","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_4","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126254283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem 基于完全分解搜索问题的组密钥交换协议
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_23
C. S. Sin, Huey Voon Chen
{"title":"Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem","authors":"C. S. Sin, Huey Voon Chen","doi":"10.1007/978-3-030-34339-2_23","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_23","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"936 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123294185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures 基于自认证域签名的符合gdpr的信誉系统
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_19
Mirosław Kutyłowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala
{"title":"GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures","authors":"Mirosław Kutyłowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala","doi":"10.1007/978-3-030-34339-2_19","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_19","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129185007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Signature Schemes with Tight Security Reductions 改进具有严格安全削减的签名方案
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_15
T. Ng, Syh-Yuan Tan, Ji-Jian Chin
{"title":"Improving Signature Schemes with Tight Security Reductions","authors":"T. Ng, Syh-Yuan Tan, Ji-Jian Chin","doi":"10.1007/978-3-030-34339-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_15","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme 同态加密方案中基于二进制逼近和实数除法的位逻辑回归
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_2
J. Yoo, Jeong-Hwan Hwang, B. Song, J. Yoon
{"title":"A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme","authors":"J. Yoo, Jeong-Hwan Hwang, B. Song, J. Yoon","doi":"10.1007/978-3-030-34339-2_2","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_2","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios 基于身份的签名方案在临时设置和泄漏场景下是安全的
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_17
L. Krzywiecki, Marta Slowik, Michal Szala
{"title":"Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios","authors":"L. Krzywiecki, Marta Slowik, Michal Szala","doi":"10.1007/978-3-030-34339-2_17","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_17","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development Activities, Tools and Techniques of Secure Microservices Compositions 安全微服务组合的开发活动、工具和技术
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_24
P. Nkomo, M. Coetzee
{"title":"Development Activities, Tools and Techniques of Secure Microservices Compositions","authors":"P. Nkomo, M. Coetzee","doi":"10.1007/978-3-030-34339-2_24","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_24","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115533580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications 使用Freivalds算法加速基于格的签名验证
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_22
Arnaud Sipasseuth, T. Plantard, W. Susilo
{"title":"Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications","authors":"Arnaud Sipasseuth, T. Plantard, W. Susilo","doi":"10.1007/978-3-030-34339-2_22","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_22","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116351052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme qTESLA方案在GPU平台上加速数论变换
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_3
W. Lee, S. Akleylek, W. Yap, B. Goi
{"title":"Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme","authors":"W. Lee, S. Akleylek, W. Yap, B. Goi","doi":"10.1007/978-3-030-34339-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_3","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信