International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands 利用AT命令对基于Zigbee的物联网网络进行内部攻击
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_6
Waqas Ahmad Piracha, M. Chowdhury, B. Ray, S. Rajasegarar, R. Doss
{"title":"Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands","authors":"Waqas Ahmad Piracha, M. Chowdhury, B. Ray, S. Rajasegarar, R. Doss","doi":"10.1007/978-981-15-0871-4_6","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_6","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"24 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120906423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Image Mathcrypt - A Flawless Security via Flawed Image 一个图像Mathcrypt -一个完美的安全通过有缺陷的图像
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_2
R. Anushiadevi, V. Venkatesh, Rengarajan Amirtharajan
{"title":"An Image Mathcrypt - A Flawless Security via Flawed Image","authors":"R. Anushiadevi, V. Venkatesh, Rengarajan Amirtharajan","doi":"10.1007/978-981-15-0871-4_2","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_2","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cog-SDN: Mitigation Mechanism for Distributed Denial of Service Attacks in Software Defined Networks Cog-SDN:软件定义网络中分布式拒绝服务攻击的缓解机制
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_16
P. Priya, K. Manjula
{"title":"Cog-SDN: Mitigation Mechanism for Distributed Denial of Service Attacks in Software Defined Networks","authors":"P. Priya, K. Manjula","doi":"10.1007/978-981-15-0871-4_16","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_16","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cellular Automata Based Key Stream Generator - A Reconfigurable Hardware Approach 基于元胞自动机的密钥流生成器——一种可重构的硬件方法
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_18
Sundararaman Rajagopalan, Nikhil Krishnaa Sriram, V. Manikandan, Sivaraman Rethinam, S. Arumugham, S. Janakiraman, Amirtharajan Rengarajan
{"title":"Cellular Automata Based Key Stream Generator - A Reconfigurable Hardware Approach","authors":"Sundararaman Rajagopalan, Nikhil Krishnaa Sriram, V. Manikandan, Sivaraman Rethinam, S. Arumugham, S. Janakiraman, Amirtharajan Rengarajan","doi":"10.1007/978-981-15-0871-4_18","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_18","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure ATM Device Design by Control Command Verification 基于控制命令验证的安全ATM设备设计
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_3
Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto
{"title":"Secure ATM Device Design by Control Command Verification","authors":"Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto","doi":"10.1007/978-981-15-0871-4_3","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_3","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126360250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Various Integrity Verification Schemes on the Data Outsourced to Cloud Storage 云存储外包数据完整性验证方案综述
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_7
S. Ganesh, S. Manikandan
{"title":"A Survey on Various Integrity Verification Schemes on the Data Outsourced to Cloud Storage","authors":"S. Ganesh, S. Manikandan","doi":"10.1007/978-981-15-0871-4_7","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_7","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130294594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confused Memory Read Attracts Synthetic Diffusion on the Fly - A Lightweight Image Encryption for IoT Platform 混淆记忆读取吸引动态合成扩散——物联网平台的轻量级图像加密
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_5
V. Raj, S. Janakiraman, Sundararaman Rajagopalan, Amirtharajan Rengarajan
{"title":"Confused Memory Read Attracts Synthetic Diffusion on the Fly - A Lightweight Image Encryption for IoT Platform","authors":"V. Raj, S. Janakiraman, Sundararaman Rajagopalan, Amirtharajan Rengarajan","doi":"10.1007/978-981-15-0871-4_5","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_5","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Password Strength Estimators Trained on the Leaked Password Lists 在泄露的密码列表上训练的密码强度估计器
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_17
Cameron R. Schafer, Lei Pan
{"title":"Password Strength Estimators Trained on the Leaked Password Lists","authors":"Cameron R. Schafer, Lei Pan","doi":"10.1007/978-981-15-0871-4_17","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_17","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tele-Transmission of Secured Prefrontal Cortex Information Records for Remote Health Care 用于远程医疗保健的安全前额皮质信息记录的远程传输
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_22
K. MonishRam, Ananya Sairaj, Ramya Lakshmi Srinivasan, R. RaajanN., R. GirishGanesan
{"title":"Tele-Transmission of Secured Prefrontal Cortex Information Records for Remote Health Care","authors":"K. MonishRam, Ananya Sairaj, Ramya Lakshmi Srinivasan, R. RaajanN., R. GirishGanesan","doi":"10.1007/978-981-15-0871-4_22","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_22","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122420363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational CBGSA - SVM Model for Network Based Intrusion Detection System 基于网络的入侵检测系统的计算CBGSA - SVM模型
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_14
Tina Manghnani, T. Thirumaran
{"title":"Computational CBGSA - SVM Model for Network Based Intrusion Detection System","authors":"Tina Manghnani, T. Thirumaran","doi":"10.1007/978-981-15-0871-4_14","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_14","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信