Information Security Practice and Experience最新文献

筛选
英文 中文
The KDM-CCA Security of REACT REACT的KDM-CCA安全性
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_5
Jinyong Chang, Honglong Dai, Maozhi Xu
{"title":"The KDM-CCA Security of REACT","authors":"Jinyong Chang, Honglong Dai, Maozhi Xu","doi":"10.1007/978-3-319-72359-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_5","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115308854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties 一种不依赖可信第三方的基于格的隐私保护生物特征认证方法
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_17
Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee
{"title":"A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties","authors":"Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee","doi":"10.1007/978-3-319-72359-4_17","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_17","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Key Bit-Dependent Attack on Protected PKC Using a Single Trace 使用单个跟踪对受保护PKC进行密钥位相关攻击
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_10
Bo-Yeon Sim, Dong‐Guk Han
{"title":"Key Bit-Dependent Attack on Protected PKC Using a Single Trace","authors":"Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1007/978-3-319-72359-4_10","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_10","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124670949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure Communications in Unmanned Aerial Vehicle Network 无人机网络中的安全通信
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_37
Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Ya-Nan Li
{"title":"Secure Communications in Unmanned Aerial Vehicle Network","authors":"Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Ya-Nan Li","doi":"10.1007/978-3-319-72359-4_37","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_37","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127889582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Verifiable Range Query Processing for Cloud Computing 云计算的可验证范围查询处理
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_19
Yanling Li, Junzuo Lai, Chuansheng Wang, Jiang Zhang, Jie Xiong
{"title":"Verifiable Range Query Processing for Cloud Computing","authors":"Yanling Li, Junzuo Lai, Chuansheng Wang, Jiang Zhang, Jie Xiong","doi":"10.1007/978-3-319-72359-4_19","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_19","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128028847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper) 基于神经网络的自动加密方案:对各种对抗模型的分析与讨论(短文)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_34
Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han
{"title":"Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)","authors":"Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han","doi":"10.1007/978-3-319-72359-4_34","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_34","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114647657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward Fuzz Test Based on Protocol Reverse Engineering 基于协议逆向工程的模糊测试研究
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_56
Jun Cai, Jianzhen Luo, Jianliang Ruan, Yan Liu
{"title":"Toward Fuzz Test Based on Protocol Reverse Engineering","authors":"Jun Cai, Jianzhen Luo, Jianliang Ruan, Yan Liu","doi":"10.1007/978-3-319-72359-4_56","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_56","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116460038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices 一种安全的基于服务器的移动设备伪随机数生成协议
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_54
Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang, H. Guesgen
{"title":"A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices","authors":"Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang, H. Guesgen","doi":"10.1007/978-3-319-72359-4_54","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_54","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting BKP IBE方案的新证明及MIMC环境下的改进
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_8
Song Luo, Lu Yan, J. Weng, Zheng Yang
{"title":"New Proof for BKP IBE Scheme and Improvement in the MIMC Setting","authors":"Song Luo, Lu Yan, J. Weng, Zheng Yang","doi":"10.1007/978-3-319-72359-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_8","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing 分层条件代理重加密:细粒度安全数据共享的新视角
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_7
Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, K. Liang
{"title":"Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing","authors":"Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, K. Liang","doi":"10.1007/978-3-319-72359-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_7","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131529122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信