Security and Privacy in Communication Networks最新文献

筛选
英文 中文
A Study of the Multiple Sign-in Feature in Web Applications Web应用程序中的多重登录特性研究
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_26
Marwan Albahar, Xing Gao, Gaby G. Dagher, Daiping Liu, Fengwei Zhang, Jidong Xiao
{"title":"A Study of the Multiple Sign-in Feature in Web Applications","authors":"Marwan Albahar, Xing Gao, Gaby G. Dagher, Daiping Liu, Fengwei Zhang, Jidong Xiao","doi":"10.1007/978-3-030-37231-6_26","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_26","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133292297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PrivC - A Framework for Efficient Secure Two-Party Computation 私有——一个高效安全的两方计算框架
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_23
Kai-yao He, Liu Yang, Jue Hong, Jinghua Jiang, Jieming Wu, Xu Dong, Z. Liang
{"title":"PrivC - A Framework for Efficient Secure Two-Party Computation","authors":"Kai-yao He, Liu Yang, Jue Hong, Jinghua Jiang, Jieming Wu, Xu Dong, Z. Liang","doi":"10.1007/978-3-030-37231-6_23","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_23","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated IoT Device Fingerprinting Through Encrypted Stream Classification 通过加密流分类自动物联网设备指纹识别
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_8
Jianhua Sun, Kun Sun, Chris Shenefiel
{"title":"Automated IoT Device Fingerprinting Through Encrypted Stream Classification","authors":"Jianhua Sun, Kun Sun, Chris Shenefiel","doi":"10.1007/978-3-030-37228-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_8","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Trojan Attack on Deep Generative Models in Autonomous Driving 自动驾驶中深度生成模型的木马攻击
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_15
Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun A. Li, Sheng Zhong
{"title":"Trojan Attack on Deep Generative Models in Autonomous Driving","authors":"Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun A. Li, Sheng Zhong","doi":"10.1007/978-3-030-37228-6_15","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_15","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Closing the Gap with APTs Through Semantic Clusters and Automated Cybergames 通过语义集群和自动化网络游戏缩小与apt的差距
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_12
Steven Gianvecchio, Christopher Burkhalter, Hongying Lan, Andrew Sillers, Kenneth P. Smith
{"title":"Closing the Gap with APTs Through Semantic Clusters and Automated Cybergames","authors":"Steven Gianvecchio, Christopher Burkhalter, Hongying Lan, Andrew Sillers, Kenneth P. Smith","doi":"10.1007/978-3-030-37228-6_12","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_12","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130353249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Random Allocation Seed-DSSS Broadcast Communication Against Jamming Attacks 随机分配种子- dsss广播通信抗干扰攻击
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_23
Ahmad Alagil, Yao Liu
{"title":"Random Allocation Seed-DSSS Broadcast Communication Against Jamming Attacks","authors":"Ahmad Alagil, Yao Liu","doi":"10.1007/978-3-030-37228-6_23","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_23","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128890839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge-Assisted CNN Inference over Encrypted Data for Internet of Things 边缘辅助CNN对物联网加密数据的推断
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_5
Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, H. Song
{"title":"Edge-Assisted CNN Inference over Encrypted Data for Internet of Things","authors":"Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, H. Song","doi":"10.1007/978-3-030-37228-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_5","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130935109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Target Information Trading - An Economic Perspective of Security 目标信息交易——安全的经济视角
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_7
Jing Hou, Li Sun, Tao Shu, Husheng Li
{"title":"Target Information Trading - An Economic Perspective of Security","authors":"Jing Hou, Li Sun, Tao Shu, Husheng Li","doi":"10.1007/978-3-030-37231-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_7","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130282858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing 面向移动众测的去中心化隐私保护声誉管理
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_26
Lichuan Ma, Qingqi Pei, Youyang Qu, Kefeng Fan, Xin Lai
{"title":"Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing","authors":"Lichuan Ma, Qingqi Pei, Youyang Qu, Kefeng Fan, Xin Lai","doi":"10.1007/978-3-030-37228-6_26","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_26","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation ChaffyScript:基于内存扰动的JavaScript漏洞不可知防御
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_10
Xunchao Hu, Brian Testa, Heng Yin
{"title":"ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation","authors":"Xunchao Hu, Brian Testa, Heng Yin","doi":"10.1007/978-3-030-37228-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_10","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"541 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133451408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信