Information Security Practice and Experience最新文献

筛选
英文 中文
A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks 基于移动参考节点的无线传感器网络安全周期时钟同步方法
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_30
Jing Xu, Yuqiang Zhang, F. Xu, Lei Zhou, Shuanglin Jiang
{"title":"A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks","authors":"Jing Xu, Yuqiang Zhang, F. Xu, Lei Zhou, Shuanglin Jiang","doi":"10.1007/978-3-319-99807-7_30","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_30","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131834148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE 再论Kannan LWE嵌入攻击中的稀疏化技术
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_27
Yuntao Wang, T. Wunderer
{"title":"Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE","authors":"Yuntao Wang, T. Wunderer","doi":"10.1007/978-3-319-99807-7_27","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_27","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121939464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption 可搜索对称加密中多重哈希的高效活板门生成
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_10
Takato Hirano, Yutaka Kawai, Yoshihiro Koseki
{"title":"Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption","authors":"Takato Hirano, Yutaka Kawai, Yoshihiro Koseki","doi":"10.1007/978-3-319-99807-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_10","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits 从乱码电路中恢复泄漏的选择密文安全功能加密
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_8
Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu
{"title":"Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits","authors":"Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu","doi":"10.1007/978-3-319-99807-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_8","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121676894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compact Ring Signature in the Standard Model for Blockchain 区块链标准模型中的紧凑环签名
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_4
Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen
{"title":"Compact Ring Signature in the Standard Model for Blockchain","authors":"Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen","doi":"10.1007/978-3-319-99807-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_4","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks T_SM:防止单迹攻击的椭圆曲线标量乘法算法
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_25
Bo-Yeon Sim, K. Choi, Dukjae Moon, H. Yoon, Jihoon Cho, Dong‐Guk Han
{"title":"T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks","authors":"Bo-Yeon Sim, K. Choi, Dukjae Moon, H. Yoon, Jihoon Cho, Dong‐Guk Han","doi":"10.1007/978-3-319-99807-7_25","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_25","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123720916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness 对抗匆忙对手的分层秘密共享方案:骗子识别和鲁棒性
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_37
P. Roy, Sabyasachi Dutta, Kirill Morozov, A. Adhikari, Kazuhide Fukushima, S. Kiyomoto, K. Sakurai
{"title":"Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness","authors":"P. Roy, Sabyasachi Dutta, Kirill Morozov, A. Adhikari, Kazuhide Fukushima, S. Kiyomoto, K. Sakurai","doi":"10.1007/978-3-319-99807-7_37","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_37","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130349704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM 分布项向量内积的安全计算及其在支持向量机中的应用
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_34
Sabyasachi Dutta, Nishant Nikam, S. Ruj
{"title":"Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM","authors":"Sabyasachi Dutta, Nishant Nikam, S. Ruj","doi":"10.1007/978-3-319-99807-7_34","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_34","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128898798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Regulating IoT Messages 监管物联网信息
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_29
A. Gabillon, Emmanuel Bruno
{"title":"Regulating IoT Messages","authors":"A. Gabillon, Emmanuel Bruno","doi":"10.1007/978-3-319-99807-7_29","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_29","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125414506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones TMGMap:设计基于触摸移动的智能手机地理密码认证
Information Security Practice and Experience Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_23
W. Meng, Zhe Liu
{"title":"TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones","authors":"W. Meng, Zhe Liu","doi":"10.1007/978-3-319-99807-7_23","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_23","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117073767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信