{"title":"A Study of the Multiple Sign-in Feature in Web Applications","authors":"Marwan Albahar, Xing Gao, Gaby G. Dagher, Daiping Liu, Fengwei Zhang, Jidong Xiao","doi":"10.1007/978-3-030-37231-6_26","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_26","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133292297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kai-yao He, Liu Yang, Jue Hong, Jinghua Jiang, Jieming Wu, Xu Dong, Z. Liang
{"title":"PrivC - A Framework for Efficient Secure Two-Party Computation","authors":"Kai-yao He, Liu Yang, Jue Hong, Jinghua Jiang, Jieming Wu, Xu Dong, Z. Liang","doi":"10.1007/978-3-030-37231-6_23","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_23","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated IoT Device Fingerprinting Through Encrypted Stream Classification","authors":"Jianhua Sun, Kun Sun, Chris Shenefiel","doi":"10.1007/978-3-030-37228-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_8","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trojan Attack on Deep Generative Models in Autonomous Driving","authors":"Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun A. Li, Sheng Zhong","doi":"10.1007/978-3-030-37228-6_15","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_15","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steven Gianvecchio, Christopher Burkhalter, Hongying Lan, Andrew Sillers, Kenneth P. Smith
{"title":"Closing the Gap with APTs Through Semantic Clusters and Automated Cybergames","authors":"Steven Gianvecchio, Christopher Burkhalter, Hongying Lan, Andrew Sillers, Kenneth P. Smith","doi":"10.1007/978-3-030-37228-6_12","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_12","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130353249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random Allocation Seed-DSSS Broadcast Communication Against Jamming Attacks","authors":"Ahmad Alagil, Yao Liu","doi":"10.1007/978-3-030-37228-6_23","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_23","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128890839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, H. Song
{"title":"Edge-Assisted CNN Inference over Encrypted Data for Internet of Things","authors":"Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, H. Song","doi":"10.1007/978-3-030-37228-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_5","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130935109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Target Information Trading - An Economic Perspective of Security","authors":"Jing Hou, Li Sun, Tao Shu, Husheng Li","doi":"10.1007/978-3-030-37231-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_7","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130282858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lichuan Ma, Qingqi Pei, Youyang Qu, Kefeng Fan, Xin Lai
{"title":"Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing","authors":"Lichuan Ma, Qingqi Pei, Youyang Qu, Kefeng Fan, Xin Lai","doi":"10.1007/978-3-030-37228-6_26","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_26","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation","authors":"Xunchao Hu, Brian Testa, Heng Yin","doi":"10.1007/978-3-030-37228-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_10","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"541 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133451408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}