CD-ARES Workshops最新文献

筛选
英文 中文
Solving the Discrete Logarithm Problem for Packing Candidate Preferences 求解离散对数问题的包装候选偏好
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_15
J. Heather, C. Culnane, Steve A. Schneider, S. Srinivasan, Zhe Xia
{"title":"Solving the Discrete Logarithm Problem for Packing Candidate Preferences","authors":"J. Heather, C. Culnane, Steve A. Schneider, S. Srinivasan, Zhe Xia","doi":"10.1007/978-3-642-40588-4_15","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_15","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PPM: Privacy Policy Manager for Personalized Services PPM:个性化服务的隐私政策管理器
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_26
S. Kiyomoto, Toru Nakamura, Haruo Takasaki, R. Watanabe, Yutaka Miyake
{"title":"PPM: Privacy Policy Manager for Personalized Services","authors":"S. Kiyomoto, Toru Nakamura, Haruo Takasaki, R. Watanabe, Yutaka Miyake","doi":"10.1007/978-3-642-40588-4_26","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_26","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121071734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function 如何使用条件概率、攻击树和犯罪函数来估计技术VaR
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_20
W. Boehmer
{"title":"How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function","authors":"W. Boehmer","doi":"10.1007/978-3-642-40588-4_20","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_20","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms 防御算法发布顺序对安全性影响的实验研究
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_22
Suliman A. Alsuhibany, Ahmad Alonaizi, C. Morisset, Chris Smith, A. Moorsel
{"title":"Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms","authors":"Suliman A. Alsuhibany, Ahmad Alonaizi, C. Morisset, Chris Smith, A. Moorsel","doi":"10.1007/978-3-642-40588-4_22","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_22","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115914165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images 从损坏的记忆图像中提取密码密钥的两种现成代数工具的比较
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_6
A. A. Kamal, Roger Zahno, A. Youssef
{"title":"A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images","authors":"A. A. Kamal, Roger Zahno, A. Youssef","doi":"10.1007/978-3-642-40588-4_6","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_6","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics 基于理想格的打包同态加密及其在生物识别中的应用
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_5
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, K. Yokoyama, Takeshi Koshiba
{"title":"Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics","authors":"Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, K. Yokoyama, Takeshi Koshiba","doi":"10.1007/978-3-642-40588-4_5","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_5","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124549690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences 多计算序列的MIST求幂算法的SPA
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_16
Chien-Ning Chen, J. Tu, Sung-Ming Yen
{"title":"SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences","authors":"Chien-Ning Chen, J. Tu, Sung-Ming Yen","doi":"10.1007/978-3-642-40588-4_16","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_16","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project 关键基础设施安全建模的依赖分析:Grid’5000项目中的案例研究
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_19
Thomas Schaberreiter, S. Varrette, P. Bouvry, J. Röning, D. Khadraoui
{"title":"Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project","authors":"Thomas Schaberreiter, S. Varrette, P. Bouvry, J. Röning, D. Khadraoui","doi":"10.1007/978-3-642-40588-4_19","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_19","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method 两层非线性块的Hand法密码分析
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_7
Xuyun Nie, Albrecht Petzoldt, J. Buchmann
{"title":"Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method","authors":"Xuyun Nie, Albrecht Petzoldt, J. Buchmann","doi":"10.1007/978-3-642-40588-4_7","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_7","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125239358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock LBlock的差分密码分析和回旋镖密码分析
CD-ARES Workshops Pub Date : 2013-09-02 DOI: 10.1007/978-3-642-40588-4_1
Jiageng Chen, A. Miyaji
{"title":"Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock","authors":"Jiageng Chen, A. Miyaji","doi":"10.1007/978-3-642-40588-4_1","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_1","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信