International Conference on Network and System Security最新文献

筛选
英文 中文
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control 高效的基于多授权级别属性的访问控制
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_14
N. Kaaniche, Sana Belguith, G. Russello
{"title":"EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control","authors":"N. Kaaniche, Sana Belguith, G. Russello","doi":"10.1007/978-3-030-02744-5_14","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_14","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122060058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Walking on the Cloud: Gait Recognition, a Wearable Solution 在云端行走:步态识别,一种可穿戴解决方案
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_13
Aniello Castiglione, Kim-Kwang Raymond Choo, M. De Marsico, Alessio Mecca
{"title":"Walking on the Cloud: Gait Recognition, a Wearable Solution","authors":"Aniello Castiglione, Kim-Kwang Raymond Choo, M. De Marsico, Alessio Mecca","doi":"10.1007/978-3-030-02744-5_13","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_13","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117335926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis on the Block Reward of Fork After Withholding (FAW) 预扣后分叉的区块奖励分析(FAW)
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_2
Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu
{"title":"Analysis on the Block Reward of Fork After Withholding (FAW)","authors":"Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu","doi":"10.1007/978-3-030-02744-5_2","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_2","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Security Authentication for IoT Devices with Lattice-Based ZK 基于栅格ZK的物联网设备安全认证研究
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_10
Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, M. Zhao, Hao Wang
{"title":"Towards Security Authentication for IoT Devices with Lattice-Based ZK","authors":"Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, M. Zhao, Hao Wang","doi":"10.1007/978-3-030-02744-5_10","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_10","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Position Paper on Blockchain Technology: Smart Contract and Applications 关于区块链技术:智能合约和应用的立场文件
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_35
W. Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow
{"title":"Position Paper on Blockchain Technology: Smart Contract and Applications","authors":"W. Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow","doi":"10.1007/978-3-030-02744-5_35","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_35","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128252980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices 移动设备上可搜索对称加密方案的性能分析
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_6
Dennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam
{"title":"Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices","authors":"Dennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam","doi":"10.1007/978-3-030-02744-5_6","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_6","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131978890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT 最新网络安全趋势:法律问题、人工智能和物联网
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_36
Jun-bin Fang, Yunpo Huang, F. Li, Jing Li, Xuan Wang, Yang Xiang
{"title":"Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT","authors":"Jun-bin Fang, Yunpo Huang, F. Li, Jing Li, Xuan Wang, Yang Xiang","doi":"10.1007/978-3-030-02744-5_36","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_36","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"888 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134438332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices LA ^3:资源受限设备的轻量级可问责匿名认证方案
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_21
Wensheng Zhang, C. Wang
{"title":"LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices","authors":"Wensheng Zhang, C. Wang","doi":"10.1007/978-3-030-02744-5_21","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_21","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Software Visualization for Supporting the Teaching of MapReduce 利用软件可视化技术支持MapReduce教学
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_26
U. F. Petrillo
{"title":"Using Software Visualization for Supporting the Teaching of MapReduce","authors":"U. F. Petrillo","doi":"10.1007/978-3-030-02744-5_26","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_26","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122619511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Attribute-Based Conditional Proxy Re-encryption 基于匿名属性的条件代理重加密
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_7
Xianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai
{"title":"Anonymous Attribute-Based Conditional Proxy Re-encryption","authors":"Xianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai","doi":"10.1007/978-3-030-02744-5_7","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_7","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123431842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信