Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization最新文献

筛选
英文 中文
Efficient Forward-Secure Threshold Signatures 高效的前向安全阈值签名
R. Kurek
{"title":"Efficient Forward-Secure Threshold Signatures","authors":"R. Kurek","doi":"10.1007/978-3-030-58208-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-58208-1_14","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"51 1","pages":"239-260"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76256168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques 用预计算和多配对技术加速Beta Weil配对
Kai Kinoshita, Koutarou Suzuki
{"title":"Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques","authors":"Kai Kinoshita, Koutarou Suzuki","doi":"10.1007/978-3-030-58208-1_15","DOIUrl":"https://doi.org/10.1007/978-3-030-58208-1_15","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"136 1","pages":"261-281"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78254073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Running Malware Before it Becomes Malicious 在运行的恶意软件变为恶意之前进行检测
Sergii Banin, Geir Olav Dyrkolbotn
{"title":"Detection of Running Malware Before it Becomes Malicious","authors":"Sergii Banin, Geir Olav Dyrkolbotn","doi":"10.1007/978-3-030-58208-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-58208-1_4","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"13 1","pages":"57-73"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86936956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points 一种更快的保持两点的CSIDH恒时算法
Hiroshi Onuki, Yusuke Aikawa, T. Yamazaki, T. Takagi
{"title":"(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points","authors":"Hiroshi Onuki, Yusuke Aikawa, T. Yamazaki, T. Takagi","doi":"10.1007/978-3-030-26834-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_2","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"43 1","pages":"23-33"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74089632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity 具有线性复杂度的双向异步棘轮密钥协议
F. Durak, S. Vaudenay
{"title":"Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity","authors":"F. Durak, S. Vaudenay","doi":"10.1007/978-3-030-26834-3_20","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_20","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"21 1","pages":"343-362"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73010447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
GRYPHON: Drone Forensics in Dataflash and Telemetry Logs 鹰头狮:无人机取证在数据闪和遥测日志
Evangelos Mantas, C. Patsakis
{"title":"GRYPHON: Drone Forensics in Dataflash and Telemetry Logs","authors":"Evangelos Mantas, C. Patsakis","doi":"10.1007/978-3-030-26834-3_22","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_22","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"19 1","pages":"377-390"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84825909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
More Results on Shortest Linear Programs 关于最短线性规划的更多结果
S. Banik, Yuki Funabiki, Takanori Isobe
{"title":"More Results on Shortest Linear Programs","authors":"S. Banik, Yuki Funabiki, Takanori Isobe","doi":"10.1007/978-3-030-26834-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_7","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"73 1","pages":"109-128"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76550318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A New Approach to Constructing Digital Signature Schemes - (Short Paper) 一种构建数字签名方案的新方法-(短文)
A. Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, A. Truu
{"title":"A New Approach to Constructing Digital Signature Schemes - (Short Paper)","authors":"A. Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, A. Truu","doi":"10.1007/978-3-030-26834-3_21","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_21","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"203 1","pages":"363-373"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74890702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure 可调TWINE:在广义Feistel结构上构建可调分组密码
Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, A. Bogdanov, S. Morioka, Takanori Isobe
{"title":"Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure","authors":"Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, A. Bogdanov, S. Morioka, Takanori Isobe","doi":"10.1007/978-3-030-26834-3_8","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_8","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"2023 1","pages":"129-145"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76285256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Efficient F_4 -style Based Algorithm to Solve MQ Problems 一种基于F_4型的MQ问题求解算法
Takuma Ito, N. Shinohara, S. Uchiyama
{"title":"An Efficient F_4 -style Based Algorithm to Solve MQ Problems","authors":"Takuma Ito, N. Shinohara, S. Uchiyama","doi":"10.1007/978-3-030-26834-3_3","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_3","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"18 1","pages":"37-52"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73402958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信