Security and Privacy in Communication Networks最新文献

筛选
英文 中文
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs Phish-Hook:使用证书透明度日志检测网络钓鱼证书
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_18
Edona Fasllija, Hasan Ferit Eniser, Bernd Prünster
{"title":"Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs","authors":"Edona Fasllija, Hasan Ferit Eniser, Bernd Prünster","doi":"10.1007/978-3-030-37231-6_18","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_18","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay 具有可信中继的高斯中继-窃听器信道的保密性
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_6
Keke Hu, Xiaohui Zhang, Yongming Wang
{"title":"Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay","authors":"Keke Hu, Xiaohui Zhang, Yongming Wang","doi":"10.1007/978-3-030-37231-6_6","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_6","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122922983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Transiency: Towards a Fair Trade of Personal Information for Application Services 应用程序的短暂性:迈向应用程序服务的个人信息的公平交易
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_3
Raquel Alvarez, J. Levenson, Ryan Sheatsley, P. Mcdaniel
{"title":"Application Transiency: Towards a Fair Trade of Personal Information for Application Services","authors":"Raquel Alvarez, J. Levenson, Ryan Sheatsley, P. Mcdaniel","doi":"10.1007/978-3-030-37231-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System 基于对抗行为特征的能源输送系统网络威胁分析
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_8
Sharif Ullah, S. Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan
{"title":"Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System","authors":"Sharif Ullah, S. Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan","doi":"10.1007/978-3-030-37231-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_8","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_24
Meng Li, Liehuang Zhu, Xiaodong Lin
{"title":"CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing","authors":"Meng Li, Liehuang Zhu, Xiaodong Lin","doi":"10.1007/978-3-030-37231-6_24","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_24","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Stochastic ADMM Based Distributed Machine Learning with Differential Privacy 基于随机ADMM的差分隐私分布式机器学习
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_13
Jiahao Ding, S. Errapotu, Haijun Zhang, Yanmin Gong, M. Pan, Zhu Han
{"title":"Stochastic ADMM Based Distributed Machine Learning with Differential Privacy","authors":"Jiahao Ding, S. Errapotu, Haijun Zhang, Yanmin Gong, M. Pan, Zhu Han","doi":"10.1007/978-3-030-37228-6_13","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_13","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121211807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts SDN中的隐蔽通道:从控制器到终端主机的信息泄漏
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_21
Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, K. Kwak, Jason H. Li
{"title":"Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts","authors":"Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, K. Kwak, Jason H. Li","doi":"10.1007/978-3-030-37228-6_21","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_21","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131047779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SoK: ATT&CK Techniques and Trends in Windows Malware Windows恶意软件的攻击和攻击技术和趋势
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_20
Kris Oosthoek, C. Doerr
{"title":"SoK: ATT&CK Techniques and Trends in Windows Malware","authors":"Kris Oosthoek, C. Doerr","doi":"10.1007/978-3-030-37228-6_20","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_20","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs 票证透明度:负责任的单点登录与隐私保护的公共日志
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_25
Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu
{"title":"Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs","authors":"Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu","doi":"10.1007/978-3-030-37228-6_25","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_25","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization SEVGuard:使用安全加密虚拟化保护用户模式应用
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_12
Ralph Palutke, Andreas Neubaum, J. Götzfried
{"title":"SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization","authors":"Ralph Palutke, Andreas Neubaum, J. Götzfried","doi":"10.1007/978-3-030-37231-6_12","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_12","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131538609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信