International Conference on Information, Communications and Signal Processing最新文献

筛选
英文 中文
Hierarchical Group Signatures with Verifier-Local Revocation 具有验证器本地撤销的分层组签名
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_16
Lin Hou, Renzhang Liu, Tian Qiu, D. Lin
{"title":"Hierarchical Group Signatures with Verifier-Local Revocation","authors":"Lin Hou, Renzhang Liu, Tian Qiu, D. Lin","doi":"10.1007/978-3-030-01950-1_16","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_16","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Linking Differential Identifiability with Differential Privacy 将差分可识别性与差分隐私联系起来
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_14
Anis Bkakria, N. Cuppens-Boulahia, F. Cuppens
{"title":"Linking Differential Identifiability with Differential Privacy","authors":"Anis Bkakria, N. Cuppens-Boulahia, F. Cuppens","doi":"10.1007/978-3-030-01950-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_14","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation 利用GPU虚拟化保护GPU加密计算私钥
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_9
Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong
{"title":"Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation","authors":"Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong","doi":"10.1007/978-3-030-01950-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_9","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Weakness of Constant Blinding PRNG in Flash Player 浅谈Flash播放器中持续致盲PRNG的缺点
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_7
Chenyu Wang, Tao Huang, Hongjun Wu
{"title":"On the Weakness of Constant Blinding PRNG in Flash Player","authors":"Chenyu Wang, Tao Huang, Hongjun Wu","doi":"10.1007/978-3-030-01950-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_7","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127710797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis 基于两步聚类分析的低速率DoS攻击检测
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_6
Dan Tang, Rui Dai, L. Tang, Sijia Zhan, Jianping Man
{"title":"Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis","authors":"Dan Tang, Rui Dai, L. Tang, Sijia Zhan, Jianping Man","doi":"10.1007/978-3-030-01950-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_6","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122317256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX 基于SGX的对称密码学构造实用高效的公钥密码系统
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_47
Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng
{"title":"PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX","authors":"Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng","doi":"10.1007/978-3-030-01950-1_47","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_47","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage 具有严格访问模式泄漏的快速双服务器多用户可搜索加密
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_23
Cédric Van Rompay, R. Molva, Melek Önen
{"title":"Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage","authors":"Cédric Van Rompay, R. Molva, Melek Önen","doi":"10.1007/978-3-030-01950-1_23","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_23","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123971377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Deep Packet Inspection with Delayed Signature Matching in Network Auditing 网络审计中延迟签名匹配的深度包检测
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_5
Yingpei Zeng, Shanqing Guo
{"title":"Deep Packet Inspection with Delayed Signature Matching in Network Auditing","authors":"Yingpei Zeng, Shanqing Guo","doi":"10.1007/978-3-030-01950-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_5","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications 基于SIMECK的差分和线性密码分析的改进自动搜索算法及其应用
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_39
Mingjiang Huang, Liming Wang, Yan Zhang
{"title":"Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications","authors":"Mingjiang Huang, Liming Wang, Yan Zhang","doi":"10.1007/978-3-030-01950-1_39","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_39","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"74 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123113166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identity-Based Functional Encryption for Quadratic Functions from Lattices 格上二次函数的基于身份的泛函加密
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_24
Kelly Yun, Xin Wang, Rui Xue
{"title":"Identity-Based Functional Encryption for Quadratic Functions from Lattices","authors":"Kelly Yun, Xin Wang, Rui Xue","doi":"10.1007/978-3-030-01950-1_24","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_24","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信