Security and Privacy in Communication Networks最新文献

筛选
英文 中文
Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations 大规模超定线性方程组的安全高效外包
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_29
Shiran Pan, W. Zhu, Qiongxiao Wang, Bing Chang
{"title":"Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations","authors":"Shiran Pan, W. Zhu, Qiongxiao Wang, Bing Chang","doi":"10.1007/978-3-030-01701-9_29","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_29","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114587079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Formal Logic Framework for the Automation of the Right to Be Forgotten 被遗忘权自动化的形式化逻辑框架
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_6
A. Tiwari, Fabian Bendun, Christian Hammer
{"title":"A Formal Logic Framework for the Automation of the Right to Be Forgotten","authors":"A. Tiwari, Fabian Bendun, Christian Hammer","doi":"10.1007/978-3-030-01701-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_6","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"38 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Neural Network Based Min-entropy Estimation for Random Number Generators 基于神经网络的随机数生成器最小熵估计
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_13
J. Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin
{"title":"Neural Network Based Min-entropy Estimation for Random Number Generators","authors":"J. Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin","doi":"10.1007/978-3-030-01704-0_13","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_13","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Multi-protocol Authentication Shibboleth Framework and Implementation for Identity Federation 身份联合的多协议认证认证框架与实现
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_5
Mengyi Li, Chi-Hung Chi, Chen Ding, R. Wong, Zhong She
{"title":"A Multi-protocol Authentication Shibboleth Framework and Implementation for Identity Federation","authors":"Mengyi Li, Chi-Hung Chi, Chen Ding, R. Wong, Zhong She","doi":"10.1007/978-3-030-01704-0_5","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_5","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution 本地存储的类固醇:滥用Web浏览器隐藏内容的存储和分发
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_19
J. Rodriguez, J. Posegga
{"title":"Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution","authors":"J. Rodriguez, J. Posegga","doi":"10.1007/978-3-030-01704-0_19","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_19","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud 大规模非线性规划到云的隐私保护外包
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_31
Ang Li, Wei Du, Qinghua Li
{"title":"Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud","authors":"Ang Li, Wei Du, Qinghua Li","doi":"10.1007/978-3-030-01701-9_31","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_31","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection FGFDect:用于Android恶意软件检测的细粒度特征分类模型
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_16
Chao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Wei-qing Huang, Bin Lv
{"title":"FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection","authors":"Chao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Wei-qing Huang, Bin Lv","doi":"10.1007/978-3-030-01701-9_16","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_16","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions 理解软件漏洞的隐藏成本:测量和预测
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_21
Afsah Anwar, Aminollah Khormali, Daehun Nyang, Aziz Mohaisen
{"title":"Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions","authors":"Afsah Anwar, Aminollah Khormali, Daehun Nyang, Aziz Mohaisen","doi":"10.1007/978-3-030-01701-9_21","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_21","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130278855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout 面向任务的安全模型,包括安全风险、成本和支出
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_11
E. SayedM.SaghaianN., T. F. Porta, T. Jaeger, Z. B. Celik, P. Mcdaniel
{"title":"Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout","authors":"E. SayedM.SaghaianN., T. F. Porta, T. Jaeger, Z. B. Celik, P. Mcdaniel","doi":"10.1007/978-3-030-01704-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_11","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things 失衡:物联网中拒绝服务的整体利用
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_3
Suhas Setikere, V. Sachidananda, Y. Elovici
{"title":"Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things","authors":"Suhas Setikere, V. Sachidananda, Y. Elovici","doi":"10.1007/978-3-030-01701-9_3","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122933904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信