International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce 舍入技术在Schnorr签名算法中的应用:已知Nonce的部分最高有效位
International Conference on Applications and Techniques in Information Security Pub Date : 2017-06-18 DOI: 10.1007/978-981-10-5421-1_5
Wenjie Qin, Kewei Lv
{"title":"Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce","authors":"Wenjie Qin, Kewei Lv","doi":"10.1007/978-981-10-5421-1_5","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_5","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133667536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi) 基于分层身份的预部署交互密钥协议(i-H-IB-KA-pdi)
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_9
Pinaki Sarkar, M. Chowdhury
{"title":"Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)","authors":"Pinaki Sarkar, M. Chowdhury","doi":"10.1007/978-981-10-2741-3_9","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_9","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Sign-Change Attack on the Montgomery Ladders 蒙哥马利梯子上新的标志变化攻击
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_1
L. Batten, M. Amain
{"title":"A New Sign-Change Attack on the Montgomery Ladders","authors":"L. Batten, M. Amain","doi":"10.1007/978-981-10-2741-3_1","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_1","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tweaking Generic OTR to Avoid Forgery Attacks 调整通用OTR以避免伪造攻击
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_4
Hassan Qahur Al Mahri, L. Simpson, Harry Bartlett, E. Dawson, Kenneth Koon-Ho Wong
{"title":"Tweaking Generic OTR to Avoid Forgery Attacks","authors":"Hassan Qahur Al Mahri, L. Simpson, Harry Bartlett, E. Dawson, Kenneth Koon-Ho Wong","doi":"10.1007/978-981-10-2741-3_4","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_4","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview 最近的网络安全攻击及其缓解方法-概述
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_5
Abdullahi Chowdhury
{"title":"Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview","authors":"Abdullahi Chowdhury","doi":"10.1007/978-981-10-2741-3_5","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_5","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption 格上基于身份的阈值加密及其在可搜索加密中的应用
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_10
Veronika Kuchta, O. Markowitch
{"title":"Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption","authors":"Veronika Kuchta, O. Markowitch","doi":"10.1007/978-981-10-2741-3_10","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_10","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile Money in the Australasian Region - A Technical Security Perspective 移动货币在澳大拉西亚地区-技术安全的角度
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_13
Swathi Parasa, L. Batten
{"title":"Mobile Money in the Australasian Region - A Technical Security Perspective","authors":"Swathi Parasa, L. Batten","doi":"10.1007/978-981-10-2741-3_13","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_13","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124485904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancement of Sensor Data Transmission by Inference and Efficient Data Processing 基于推理和高效数据处理的传感器数据传输增强
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_7
James Jin Kang, T. Luan, Henry Larkin
{"title":"Enhancement of Sensor Data Transmission by Inference and Efficient Data Processing","authors":"James Jin Kang, T. Luan, Henry Larkin","doi":"10.1007/978-981-10-2741-3_7","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_7","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Improved EllipticNet Algorithm for Tate Pairing on Weierstrass' Curves, Faster Point Arithmetic and Pairing on Selmer Curves and a Note on Double Scalar Multiplication Weierstrass曲线上Tate配对的改进椭圆网算法、更快的点算法和Selmer曲线上的配对以及关于双标量乘法的一个注记
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_8
S. Rao
{"title":"An Improved EllipticNet Algorithm for Tate Pairing on Weierstrass' Curves, Faster Point Arithmetic and Pairing on Selmer Curves and a Note on Double Scalar Multiplication","authors":"S. Rao","doi":"10.1007/978-981-10-2741-3_8","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_8","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124591575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks 基于事件触发分布式滤波的传感器网络物理系统假信号注入攻击检测
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_12
Yufeng Lin, B. Ray, D. Jarvis, Jia Wang
{"title":"False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks","authors":"Yufeng Lin, B. Ray, D. Jarvis, Jia Wang","doi":"10.1007/978-981-10-2741-3_12","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_12","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信