Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization最新文献

筛选
英文 中文
API Usability of Stateful Signature Schemes 状态签名方案的API可用性
A. Zeier, A. Wiesmaier, A. Heinemann
{"title":"API Usability of Stateful Signature Schemes","authors":"A. Zeier, A. Wiesmaier, A. Heinemann","doi":"10.1007/978-3-030-26834-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_13","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"34 6 1","pages":"221-240"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82789354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions 不可延展性对可重复CCA和其他rcca安全概念的等价性
Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura
{"title":"Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions","authors":"Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura","doi":"10.1007/978-3-030-26834-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_15","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"26 1","pages":"253-272"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77422458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection 基于熵的特征在高低强度DDoS攻击检测中的有效性
Abigail M. Y. Koay, I. Welch, Winston K.G. Seah
{"title":"(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection","authors":"Abigail M. Y. Koay, I. Welch, Winston K.G. Seah","doi":"10.1007/978-3-030-26834-3_12","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_12","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"65 1","pages":"207-217"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76816639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification 关联高级和低级特征:-增加对恶意软件分类的理解
Sergii Banin, Geir Olav Dyrkolbotn
{"title":"Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification","authors":"Sergii Banin, Geir Olav Dyrkolbotn","doi":"10.1007/978-3-030-26834-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_9","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"22 1","pages":"149-167"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79139162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
(Short Paper) Method for Preventing Suspicious Web Access in Android WebView (短文)Android WebView中防止可疑Web访问的方法
Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi
{"title":"(Short Paper) Method for Preventing Suspicious Web Access in Android WebView","authors":"Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi","doi":"10.1007/978-3-030-26834-3_14","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_14","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"71 1","pages":"241-250"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85564014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm 基于Strassen-Winograd算法的安全多方矩阵乘法
J. Dumas, P. Lafourcade, J. L. Fenner, David Lucas, J. Orfila, Clément Pernet, Maxime Puys
{"title":"Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm","authors":"J. Dumas, P. Lafourcade, J. L. Fenner, David Lucas, J. Orfila, Clément Pernet, Maxime Puys","doi":"10.1007/978-3-030-26834-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_5","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"95 6 1","pages":"67-88"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80685368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
VSS Made Simpler VSS变得更简单
Y. Desmedt, Kirill Morozov
{"title":"VSS Made Simpler","authors":"Y. Desmedt, Kirill Morozov","doi":"10.1007/978-3-030-26834-3_19","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_19","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"27 1","pages":"329-342"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85616900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Efficient Detection of Malicious VBA Macros with LSI 利用LSI实现恶意VBA宏的高效检测
M. Mimura, Taro Ohminami
{"title":"Towards Efficient Detection of Malicious VBA Macros with LSI","authors":"M. Mimura, Taro Ohminami","doi":"10.1007/978-3-030-26834-3_10","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_10","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"35 1","pages":"168-185"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82449198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper) 基于混淆技术的标准模型Cocks基于身份的加密(短文)
Xin Wang, Shimin Li, Rui Xue
{"title":"Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)","authors":"Xin Wang, Shimin Li, Rui Xue","doi":"10.1007/978-3-030-26834-3_16","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_16","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"2 1","pages":"273-283"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91417350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward the Analysis of Distributed Code Injection in Post-mortem Forensics 分布式代码注入在死后取证中的分析
Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard
{"title":"Toward the Analysis of Distributed Code Injection in Post-mortem Forensics","authors":"Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard","doi":"10.1007/978-3-030-26834-3_23","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_23","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"7 1 1","pages":"391-409"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79501870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信