International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
A Hybrid Approach for Malware Family Classification 恶意软件族分类的混合方法
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_14
Naqqash Aman, Y. Saleem, Fahim H. Abbasi, F. Shahzad
{"title":"A Hybrid Approach for Malware Family Classification","authors":"Naqqash Aman, Y. Saleem, Fahim H. Abbasi, F. Shahzad","doi":"10.1007/978-981-10-5421-1_14","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_14","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129959536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Low-Complexity Signature-Based Malware Detection for IoT Devices 基于低复杂度签名的物联网设备恶意软件检测
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_15
Muhamed Fauzi Bin Abbas, T. Srikanthan
{"title":"Low-Complexity Signature-Based Malware Detection for IoT Devices","authors":"Muhamed Fauzi Bin Abbas, T. Srikanthan","doi":"10.1007/978-981-10-5421-1_15","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_15","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114725136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
De-anonymous and Anonymous Technologies for Network Traffic Release 网络流量释放的去匿名和匿名技术
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_16
Xiang Tian, Yu Wang, Yujia Zhu, Yong Sun, Qingyun Liu
{"title":"De-anonymous and Anonymous Technologies for Network Traffic Release","authors":"Xiang Tian, Yu Wang, Yujia Zhu, Yong Sun, Qingyun Liu","doi":"10.1007/978-981-10-5421-1_16","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_16","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems 基于Wi-Fi的室内定位系统的隐私感知认证
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_17
S. Yoo, J. Barriga
{"title":"Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems","authors":"S. Yoo, J. Barriga","doi":"10.1007/978-981-10-5421-1_17","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_17","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Effectiveness of Non-readable Executable Memory Against BROP 不可读可执行内存对BROP的有效性研究
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_18
Christian Otterstad
{"title":"On the Effectiveness of Non-readable Executable Memory Against BROP","authors":"Christian Otterstad","doi":"10.1007/978-981-10-5421-1_18","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_18","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES 减轮AES上不可能差分密码分析的实际实现
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_6
Sourya Kakarla, Srinath Mandava, Dhiman Saha, D. R. Chowdhury
{"title":"On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES","authors":"Sourya Kakarla, Srinath Mandava, Dhiman Saha, D. R. Chowdhury","doi":"10.1007/978-981-10-5421-1_6","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_6","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems 击败可信的否认VeraCrypt隐藏操作系统
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_1
M. Kedziora, Yang-Wai Chow, W. Susilo
{"title":"Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems","authors":"M. Kedziora, Yang-Wai Chow, W. Susilo","doi":"10.1007/978-981-10-5421-1_1","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_1","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security Analysis of a Design Variant of Randomized Hashing 随机散列的一种设计变体的安全性分析
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_2
Praveen Gauravaram, Shoichi Hirose, D. Stebila
{"title":"Security Analysis of a Design Variant of Randomized Hashing","authors":"Praveen Gauravaram, Shoichi Hirose, D. Stebila","doi":"10.1007/978-981-10-5421-1_2","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_2","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESTful Is Not Secure RESTful不安全
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_12
T. Yarygina
{"title":"RESTful Is Not Secure","authors":"T. Yarygina","doi":"10.1007/978-981-10-5421-1_12","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_12","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126227713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Efficient Non-transferable Proxy Re-encryption Scheme 一种高效的不可转移代理重加密方案
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_4
S. S. D. Selvi, Arinjita Paul, C. Rangan
{"title":"An Efficient Non-transferable Proxy Re-encryption Scheme","authors":"S. S. D. Selvi, Arinjita Paul, C. Rangan","doi":"10.1007/978-981-10-5421-1_4","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_4","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信