Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization最新文献

筛选
英文 中文
Optimum Attack on 3-Round Feistel-2 Structure 对3轮费斯特尔-2结构的最佳攻击
Takanori Daiza, K. Kurosawa
{"title":"Optimum Attack on 3-Round Feistel-2 Structure","authors":"Takanori Daiza, K. Kurosawa","doi":"10.1007/978-3-030-85987-9_10","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_10","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"27 1 1","pages":"175-192"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89914109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem LWR问题的Bai-Galbraith嵌入攻击的格中最短向量
Shusaku Uemura, Kazuhide Fukushima, S. Kiyomoto, Momonari Kudo, T. Takagi
{"title":"Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem","authors":"Shusaku Uemura, Kazuhide Fukushima, S. Kiyomoto, Momonari Kudo, T. Takagi","doi":"10.1007/978-3-030-85987-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_2","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"34 1","pages":"23-41"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87980997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Target Defense for the CloudControl Game 移动目标防御的云控制游戏
K. Hamasaki, H. Hohjo
{"title":"Moving Target Defense for the CloudControl Game","authors":"K. Hamasaki, H. Hohjo","doi":"10.1007/978-3-030-85987-9_14","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_14","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"11 1","pages":"241-251"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87320731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
(Short Paper) Simple Matrix Signature Scheme (短文)简单矩阵签名方案
Changze Yin, Yacheng Wang, T. Takagi
{"title":"(Short Paper) Simple Matrix Signature Scheme","authors":"Changze Yin, Yacheng Wang, T. Takagi","doi":"10.1007/978-3-030-85987-9_13","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_13","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"3 1","pages":"227-237"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78855816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH 静态/瞬变CSIDH的强故障攻击分析
Jason Legrow, A. Hutchinson
{"title":"(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH","authors":"Jason Legrow, A. Hutchinson","doi":"10.1007/978-3-030-85987-9_12","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_12","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"11 1","pages":"216-226"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83492627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption 防止内核内存损坏的内核页面限制机制
Hiroki Kuzuno, Toshihiro Yamauchi
{"title":"KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption","authors":"Hiroki Kuzuno, Toshihiro Yamauchi","doi":"10.1007/978-3-030-85987-9_3","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_3","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"10 1","pages":"45-63"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81502887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language 利用马来语的双象特征建立爪哇验证码的建议
H. Yamaba, A. Sohaimi, Shotaro Usuzaki, K. Aburada, M. Mukunoki, Mirang Park, N. Okazaki
{"title":"Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language","authors":"H. Yamaba, A. Sohaimi, Shotaro Usuzaki, K. Aburada, M. Mukunoki, Mirang Park, N. Okazaki","doi":"10.1007/978-3-030-85987-9_7","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_7","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"1 1","pages":"119-133"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78317624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trace Map Attack Against Special Ring-LWE Samples 针对特殊环lwe样本的跟踪映射攻击
Yasuhiko Ikematsu, Satoshi Nakamura, Masaya Yasuda
{"title":"A Trace Map Attack Against Special Ring-LWE Samples","authors":"Yasuhiko Ikematsu, Satoshi Nakamura, Masaya Yasuda","doi":"10.1007/978-3-030-85987-9_1","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_1","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"36 1","pages":"3-22"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73401108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FFT Program Generation for Ring LWE-Based Cryptography 基于环lwe密码的FFT程序生成
Masahiro Masuda, Yukiyoshi Kameyama
{"title":"FFT Program Generation for Ring LWE-Based Cryptography","authors":"Masahiro Masuda, Yukiyoshi Kameyama","doi":"10.1007/978-3-030-85987-9_9","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_9","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"13 1","pages":"151-171"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78385798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring 基于虚拟机监控的证据收集与保存系统
Toru Nakamura, Hiroshi Ito, S. Kiyomoto, Toshihiro Yamauchi
{"title":"(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring","authors":"Toru Nakamura, Hiroshi Ito, S. Kiyomoto, Toshihiro Yamauchi","doi":"10.1007/978-3-030-85987-9_4","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_4","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"17 1","pages":"64-73"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82107494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信