Security of Ubiquitous Computing Systems最新文献

筛选
英文 中文
An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families Simon和Speck分组密码族的ISO/IEC标准化概述
Security of Ubiquitous Computing Systems Pub Date : 2021-01-15 DOI: 10.1007/978-3-030-10591-4_4
T. Ashur, Atul Luykx
{"title":"An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families","authors":"T. Ashur, Atul Luykx","doi":"10.1007/978-3-030-10591-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_4","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126701844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach 面向隐私的普适计算系统分析:一种5维方法
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_12
A. Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, C. Patsakis
{"title":"Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach","authors":"A. Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, C. Patsakis","doi":"10.1007/978-3-030-10591-4_12","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_12","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121241498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
From Relay Attacks to Distance-Bounding Protocols 从中继攻击到距离绑定协议
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_7
Gildas Avoine, Ioana Boureanu, David Gérault, G. Hancke, P. Lafourcade, Cristina Onete
{"title":"From Relay Attacks to Distance-Bounding Protocols","authors":"Gildas Avoine, Ioana Boureanu, David Gérault, G. Hancke, P. Lafourcade, Cristina Onete","doi":"10.1007/978-3-030-10591-4_7","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_7","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Catalog and Illustrative Examples of Lightweight Cryptographic Primitives 轻量级密码原语的目录和说明性示例
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_2
A. Mileva, V. Dimitrova, Orhun Kara, M. Mihaljević
{"title":"Catalog and Illustrative Examples of Lightweight Cryptographic Primitives","authors":"A. Mileva, V. Dimitrova, Orhun Kara, M. Mihaljević","doi":"10.1007/978-3-030-10591-4_2","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_2","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133930092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Emerging Security Challenges for Ubiquitous Devices 无处不在设备面临的新安全挑战
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_1
Mirosław Kutyłowski, P. Syga, M. Yung
{"title":"Emerging Security Challenges for Ubiquitous Devices","authors":"Mirosław Kutyłowski, P. Syga, M. Yung","doi":"10.1007/978-3-030-10591-4_1","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_1","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132929521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It Started with Templates: The Future of Profiling in Side-Channel Analysis 从模板开始:侧通道分析中分析的未来
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_8
L. Batina, Milena Djukanovic, Annelie Heuser, S. Picek
{"title":"It Started with Templates: The Future of Profiling in Side-Channel Analysis","authors":"L. Batina, Milena Djukanovic, Annelie Heuser, S. Picek","doi":"10.1007/978-3-030-10591-4_8","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_8","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Finding Software Bugs in Embedded Devices 发现嵌入式设备中的软件bug
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_11
Aurélien Francillon, Sam L. Thomas, Andrei Costin
{"title":"Finding Software Bugs in Embedded Devices","authors":"Aurélien Francillon, Sam L. Thomas, Andrei Costin","doi":"10.1007/978-3-030-10591-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_11","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123129692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators 认证小规模(物联网)硬件随机数生成器的挑战
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_10
D. Hurley-Smith, J. Hernandez-Castro
{"title":"Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators","authors":"D. Hurley-Smith, J. Hernandez-Castro","doi":"10.1007/978-3-030-10591-4_10","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_10","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129698754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ePassport and eID Technologies 电子护照和电子身份技术
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_5
L. Hanzlik, Mirosław Kutyłowski
{"title":"ePassport and eID Technologies","authors":"L. Hanzlik, Mirosław Kutyłowski","doi":"10.1007/978-3-030-10591-4_5","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_5","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127616271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ultra-lightweight Authentication 超轻量级的认证
Security of Ubiquitous Computing Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-10591-4_6
Xavier Carpent, P. D’Arco, R. Prisco
{"title":"Ultra-lightweight Authentication","authors":"Xavier Carpent, P. D’Arco, R. Prisco","doi":"10.1007/978-3-030-10591-4_6","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_6","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133431110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信