ACM SIGSOFT Symposium on Software Reusability最新文献

筛选
英文 中文
Attribute-Based Access Control Architectures with the eIDAS Protocols 基于属性的访问控制体系结构与eIDAS协议
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_9
F. Morgner, Paul Bastian, M. Fischlin
{"title":"Attribute-Based Access Control Architectures with the eIDAS Protocols","authors":"F. Morgner, Paul Bastian, M. Fischlin","doi":"10.1007/978-3-319-49100-4_9","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_9","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116424846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extending the UML Standards to Model Tree-Structured Data and Their Access Control Requirements 扩展UML标准以建模树结构数据及其访问控制需求
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_8
A. D. L. R. Algarin, S. Demurjian
{"title":"Extending the UML Standards to Model Tree-Structured Data and Their Access Control Requirements","authors":"A. D. L. R. Algarin, S. Demurjian","doi":"10.1007/978-3-319-49100-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_8","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities 算法敏捷性——TPM 2.0 ECC功能的讨论
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_6
Liqun Chen, Rainer Urian
{"title":"Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities","authors":"Liqun Chen, Rainer Urian","doi":"10.1007/978-3-319-49100-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_6","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127516907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of a Proposed Hash-Based Signature Standard 一个提议的基于哈希的签名标准分析
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_12
Jonathan Katz
{"title":"Analysis of a Proposed Hash-Based Signature Standard","authors":"Jonathan Katz","doi":"10.1007/978-3-319-49100-4_12","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_12","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"30 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
NFC Payment Spy: A Privacy Attack on Contactless Payments NFC支付间谍:对非接触式支付的隐私攻击
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_4
M. Mehrnezhad, M. Ali, F. Hao, A. Moorsel
{"title":"NFC Payment Spy: A Privacy Attack on Contactless Payments","authors":"M. Mehrnezhad, M. Ali, F. Hao, A. Moorsel","doi":"10.1007/978-3-319-49100-4_4","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_4","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124397947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cross-Tool Semantics for Protocol Security Goals 协议安全目标的跨工具语义
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_2
J. Guttman, John D. Ramsdell, Paul D. Rowe
{"title":"Cross-Tool Semantics for Protocol Security Goals","authors":"J. Guttman, John D. Ramsdell, Paul D. Rowe","doi":"10.1007/978-3-319-49100-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_2","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132131946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reactive and Proactive Standardisation of TLS TLS的被动和主动标准化
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_7
K. Paterson, Thyla van der Merwe
{"title":"Reactive and Proactive Standardisation of TLS","authors":"K. Paterson, Thyla van der Merwe","doi":"10.1007/978-3-319-49100-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_7","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Analyzing and Fixing the QACCE Security of QUIC QUIC的QACCE安全性分析与修复
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_1
Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida
{"title":"Analyzing and Fixing the QACCE Security of QUIC","authors":"Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida","doi":"10.1007/978-3-319-49100-4_1","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_1","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"187 2-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114111677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Multicast Group Management and Key Distribution in IEEE 802.21 IEEE 802.21中的安全组播组管理和密钥分发
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_10
Yoshikazu Hanatani, Naoki Ogura, Y. Ohba, Lidong Chen, S. Das
{"title":"Secure Multicast Group Management and Key Distribution in IEEE 802.21","authors":"Yoshikazu Hanatani, Naoki Ogura, Y. Ohba, Lidong Chen, S. Das","doi":"10.1007/978-3-319-49100-4_10","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_10","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of the PKCS#11 API Using the Maude-NPA Tool 使用Maude-NPA工具分析pkcs# 11 API
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_5
Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, C. Meadows, J. Meseguer
{"title":"Analysis of the PKCS#11 API Using the Maude-NPA Tool","authors":"Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, C. Meadows, J. Meseguer","doi":"10.1007/978-3-319-27152-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_5","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书