Security and Privacy in Communication Networks最新文献

筛选
英文 中文
A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications 物联网(IoT)轻量级认证方案的回顾与成本计算:面向智能家居应用的认证架构设计
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_20
Attlee M. Gamundani, Amelia Phillips, H. Muyingi
{"title":"A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications","authors":"Attlee M. Gamundani, Amelia Phillips, H. Muyingi","doi":"10.1007/978-3-030-01704-0_20","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_20","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network 基于模糊神经网络的安全AODV协议改进方案
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_26
Tongyi Xie, Jiawei Mo, Baohua Huang
{"title":"A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network","authors":"Tongyi Xie, Jiawei Mo, Baohua Huang","doi":"10.1007/978-3-030-01704-0_26","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_26","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design 基于激励设计的无阈值信任管理鲁棒入侵检测网络
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_8
Amir Rezapour, Wen-Guey Tzeng
{"title":"A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design","authors":"Amir Rezapour, Wen-Guey Tzeng","doi":"10.1007/978-3-030-01704-0_8","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_8","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130558714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Transparent Low-Latency Network Anonymisation for Mobile Devices 透明低延迟网络匿名移动设备
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_11
Martin Byrenheid, S. Köpsell, Alexander Naumenko, T. Strufe
{"title":"Transparent Low-Latency Network Anonymisation for Mobile Devices","authors":"Martin Byrenheid, S. Köpsell, Alexander Naumenko, T. Strufe","doi":"10.1007/978-3-030-01701-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_11","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era CAVAS:消除云原生时代的应用程序和容器安全漏洞
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_26
K. Torkura, M. Sukmana, Feng Cheng, C. Meinel
{"title":"CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era","authors":"K. Torkura, M. Sukmana, Feng Cheng, C. Meinel","doi":"10.1007/978-3-030-01701-9_26","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_26","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126519747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale FrameHanger:大规模Iframe注入的评估与分类
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_17
K. Tian, Zhou Li, Kevin D. Bowers, D. Yao
{"title":"FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale","authors":"K. Tian, Zhou Li, Kevin D. Bowers, D. Yao","doi":"10.1007/978-3-030-01704-0_17","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_17","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122779319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT 支持物联网中高效细粒度访问控制和数据处理的安全远程监控框架
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_1
Yaxing Chen, Wenhai Sun, Ning Zhang, Q. Zheng, W. Lou, Y. T. Hou
{"title":"A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT","authors":"Yaxing Chen, Wenhai Sun, Ning Zhang, Q. Zheng, W. Lou, Y. T. Hou","doi":"10.1007/978-3-030-01701-9_1","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_1","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs 使用嵌入式gpu在公共云服务上构建私有云存储
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_28
Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li
{"title":"Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs","authors":"Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li","doi":"10.1007/978-3-030-01701-9_28","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_28","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching 基于特征的字符串相似度匹配的恶意漏洞检测
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_23
Sungjin Kim, Brent Byunghoon Kang
{"title":"FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching","authors":"Sungjin Kim, Brent Byunghoon Kang","doi":"10.1007/978-3-030-01701-9_23","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_23","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128273358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing 保护隐私的数据共享安全高效的多方目录发布
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_5
K. Areekijseree, Y. Tang, Ju Chen, Shuang Wang, A. Iyengar, Balaji Palanisamy
{"title":"Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing","authors":"K. Areekijseree, Y. Tang, Ju Chen, Shuang Wang, A. Iyengar, Balaji Palanisamy","doi":"10.1007/978-3-030-01701-9_5","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_5","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信