Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization最新文献

筛选
英文 中文
Extractable Witness Encryption for the Homogeneous Linear Equations Problem 齐次线性方程问题的可提取见证加密
Bénédikt Tran, S. Vaudenay
{"title":"Extractable Witness Encryption for the Homogeneous Linear Equations Problem","authors":"Bénédikt Tran, S. Vaudenay","doi":"10.1007/978-3-031-41326-1_9","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_9","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"12 1","pages":"152-172"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79567782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs 从具有非上下文ioc的CTI源的非结构化文本中提取信息
Shota Fujii, N. Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi
{"title":"CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs","authors":"Shota Fujii, N. Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi","doi":"10.1007/978-3-031-15255-9_5","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_5","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"37 1","pages":"85-104"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89213524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methods of Extracting Parameters of the Processor Caches 处理器缓存参数提取方法
Sihao Shen, Zhenzhen Li, Wei Song
{"title":"Methods of Extracting Parameters of the Processor Caches","authors":"Sihao Shen, Zhenzhen Li, Wei Song","doi":"10.1007/978-3-031-15255-9_3","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_3","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"9 1","pages":"47-65"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89323782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices 晶格的抗量子1- of- n无关特征
Jing-Shiuan You, Zi-Yuan Liu, R. Tso, Yi-Fan Tseng, M. Mambo
{"title":"Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices","authors":"Jing-Shiuan You, Zi-Yuan Liu, R. Tso, Yi-Fan Tseng, M. Mambo","doi":"10.1007/978-3-031-15255-9_9","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_9","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"60 1","pages":"166-186"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88182719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key 使用内存保护键的内核数据保护机制
Hiroki Kuzuno, Toshihiro Yamauchi
{"title":"KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key","authors":"Hiroki Kuzuno, Toshihiro Yamauchi","doi":"10.1007/978-3-031-15255-9_4","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_4","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"14 1","pages":"66-84"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79791120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Card-Based Secure Sorting Protocol 基于卡的安全排序协议
Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yu-ichi Hayashi, T. Mizuki
{"title":"Card-Based Secure Sorting Protocol","authors":"Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yu-ichi Hayashi, T. Mizuki","doi":"10.1007/978-3-031-15255-9_12","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_12","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"59 1","pages":"224-240"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79922906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes 生日绑定幻灯片攻击TinyJAMBU的所有键大小的键排列
Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, K. Yasuda
{"title":"Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes","authors":"Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, K. Yasuda","doi":"10.1007/978-3-031-15255-9_6","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_6","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"24 1","pages":"107-127"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74804113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles 无量子加密预言机的3轮Feistel-2结构量子密钥恢复攻击
Takanori Daiza, Kazuki Yoneyama
{"title":"Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles","authors":"Takanori Daiza, Kazuki Yoneyama","doi":"10.1007/978-3-031-15255-9_7","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_7","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"SE-10 1","pages":"128-144"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84637227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values 修正随机醋值,改善彩虹的故障攻击
Taku Kato, Yutaro Kiyomura, T. Takagi
{"title":"Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values","authors":"Taku Kato, Yutaro Kiyomura, T. Takagi","doi":"10.1007/978-3-031-15255-9_8","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_8","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"1 1","pages":"147-165"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75938891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions 基于特征属性聚类变化的基于机器学习的恶意软件检测研究进展
Yun Fan, Toshiki Shibahara, Y. Ohsita, Daiki Chiba, Mitsuaki Akiyama, M. Murata
{"title":"Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions","authors":"Yun Fan, Toshiki Shibahara, Y. Ohsita, Daiki Chiba, Mitsuaki Akiyama, M. Murata","doi":"10.1007/978-3-030-85987-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_6","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"52 1","pages":"99-118"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85178164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信