Information Security Practice and Experience最新文献

筛选
英文 中文
A Practical Authentication Protocol for Anonymous Web Browsing 一种实用的匿名Web浏览认证协议
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_28
Xuechao Yang, X. Yi, Hui Cui, Xuechao Yang, S. Nepal, Xinyi Huang, Yali Zeng
{"title":"A Practical Authentication Protocol for Anonymous Web Browsing","authors":"Xuechao Yang, X. Yi, Hui Cui, Xuechao Yang, S. Nepal, Xinyi Huang, Yali Zeng","doi":"10.1007/978-3-319-72359-4_28","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_28","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite 快速离散高斯采样和后量子TLS密码套件
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_33
Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. Saraswathy, Zhe Liu
{"title":"Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite","authors":"Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. Saraswathy, Zhe Liu","doi":"10.1007/978-3-319-72359-4_33","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_33","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking 黑名单检测的基于组的源-目的可验证加密
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_11
Zhongyuan Yao, Y. Mu, Guomin Yang
{"title":"Group-Based Source-Destination Verifiable Encryption with Blacklist Checking","authors":"Zhongyuan Yao, Y. Mu, Guomin Yang","doi":"10.1007/978-3-319-72359-4_11","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_11","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper) 面向共享网络威胁情报的相关性过滤(短论文)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_35
Thomas D. Wagner, Esther Palomar, K. Mahbub, A. Abdallah
{"title":"Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper)","authors":"Thomas D. Wagner, Esther Palomar, K. Mahbub, A. Abdallah","doi":"10.1007/978-3-319-72359-4_35","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_35","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122120117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Effective Authentication for Client Application Using ARM TrustZone 基于ARM TrustZone的客户端应用认证
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_50
Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang
{"title":"An Effective Authentication for Client Application Using ARM TrustZone","authors":"Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang","doi":"10.1007/978-3-319-72359-4_50","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_50","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125948373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper) 移动社交网络中的家庭位置保护:一种基于社区的方法(短文)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_43
B. Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yang Wang, Y. Xiang, Jin Li
{"title":"Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper)","authors":"B. Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yang Wang, Y. Xiang, Jin Li","doi":"10.1007/978-3-319-72359-4_43","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_43","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
TTP-free Fair Exchange of Digital Signatures with Bitcoin 用比特币公平交换数字签名
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_4
Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li
{"title":"TTP-free Fair Exchange of Digital Signatures with Bitcoin","authors":"Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li","doi":"10.1007/978-3-319-72359-4_4","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_4","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116381602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper) 不可区分混淆下随机Oracle模型中的快速自适应安全签名(短文篇)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_25
Bei Liang, Aikaterini Mitrokotsa
{"title":"Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper)","authors":"Bei Liang, Aikaterini Mitrokotsa","doi":"10.1007/978-3-319-72359-4_25","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_25","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121691194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption 环- lwe同态加密上安全多矩阵乘法的增强
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_18
P. Mishra, D. Duong, Masaya Yasuda
{"title":"Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption","authors":"P. Mishra, D. Duong, Masaya Yasuda","doi":"10.1007/978-3-319-72359-4_18","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_18","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129225545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Outsourcing Encrypted Excel Files 外包加密Excel文件
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_30
Ya-Nan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao
{"title":"Outsourcing Encrypted Excel Files","authors":"Ya-Nan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao","doi":"10.1007/978-3-319-72359-4_30","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_30","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132724512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信