{"title":"EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control","authors":"N. Kaaniche, Sana Belguith, G. Russello","doi":"10.1007/978-3-030-02744-5_14","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_14","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122060058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aniello Castiglione, Kim-Kwang Raymond Choo, M. De Marsico, Alessio Mecca
{"title":"Walking on the Cloud: Gait Recognition, a Wearable Solution","authors":"Aniello Castiglione, Kim-Kwang Raymond Choo, M. De Marsico, Alessio Mecca","doi":"10.1007/978-3-030-02744-5_13","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_13","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117335926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on the Block Reward of Fork After Withholding (FAW)","authors":"Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu","doi":"10.1007/978-3-030-02744-5_2","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_2","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, M. Zhao, Hao Wang
{"title":"Towards Security Authentication for IoT Devices with Lattice-Based ZK","authors":"Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, M. Zhao, Hao Wang","doi":"10.1007/978-3-030-02744-5_10","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_10","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow
{"title":"Position Paper on Blockchain Technology: Smart Contract and Applications","authors":"W. Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow","doi":"10.1007/978-3-030-02744-5_35","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_35","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128252980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices","authors":"Dennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam","doi":"10.1007/978-3-030-02744-5_6","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_6","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131978890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun-bin Fang, Yunpo Huang, F. Li, Jing Li, Xuan Wang, Yang Xiang
{"title":"Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT","authors":"Jun-bin Fang, Yunpo Huang, F. Li, Jing Li, Xuan Wang, Yang Xiang","doi":"10.1007/978-3-030-02744-5_36","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_36","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"888 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134438332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices","authors":"Wensheng Zhang, C. Wang","doi":"10.1007/978-3-030-02744-5_21","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_21","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Software Visualization for Supporting the Teaching of MapReduce","authors":"U. F. Petrillo","doi":"10.1007/978-3-030-02744-5_26","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_26","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122619511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}