International Conference on Network and System Security最新文献

筛选
英文 中文
Multi-user Forward Secure Dynamic Searchable Symmetric Encryption 多用户前向安全动态可搜索对称加密
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_9
Qiaoren Wang, Yu Guo, Hejiao Huang, X. Jia
{"title":"Multi-user Forward Secure Dynamic Searchable Symmetric Encryption","authors":"Qiaoren Wang, Yu Guo, Hejiao Huang, X. Jia","doi":"10.1007/978-3-030-02744-5_9","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_9","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity 具有强匿名性的可证明安全的双因素认证密钥交换协议
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_8
Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo
{"title":"A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity","authors":"Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo","doi":"10.1007/978-3-030-02744-5_8","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_8","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs 一种高效的具有可检测功能的vanet批认证方案
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_22
Jinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang
{"title":"An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs","authors":"Jinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang","doi":"10.1007/978-3-030-02744-5_22","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_22","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Context-aware Failure-oblivious Computing as a Means of Preventing Buffer Overflows 上下文感知的无关故障计算作为一种防止缓冲区溢出的方法
International Conference on Network and System Security Pub Date : 2018-06-23 DOI: 10.1007/978-3-030-02744-5_29
Manuel Rigger, Daniel Pekarek, H. Mössenböck
{"title":"Context-aware Failure-oblivious Computing as a Means of Preventing Buffer Overflows","authors":"Manuel Rigger, Daniel Pekarek, H. Mössenböck","doi":"10.1007/978-3-030-02744-5_29","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_29","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126385523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Real-Time IoT Device Activity Detection in Edge Networks 边缘网络中的实时物联网设备活动检测
International Conference on Network and System Security Pub Date : 2017-12-16 DOI: 10.1007/978-3-030-02744-5_17
I. Hafeez, A. Ding, M. Antikainen, S. Tarkoma
{"title":"Real-Time IoT Device Activity Detection in Edge Networks","authors":"I. Hafeez, A. Ding, M. Antikainen, S. Tarkoma","doi":"10.1007/978-3-030-02744-5_17","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_17","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129128361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Defenses Against Wormhole Attacks in Wireless Sensor Networks 无线传感器网络中的虫洞攻击防御
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_30
Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang
{"title":"Defenses Against Wormhole Attacks in Wireless Sensor Networks","authors":"Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang","doi":"10.1007/978-3-319-64701-2_30","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_30","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Private Membership Test Protocol with Low Communication Complexity 具有低通信复杂度的私有成员测试协议
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_3
Sara Ramezanian, Tommi Meskanen, M. Naderpour, Valtteri Niemi
{"title":"Private Membership Test Protocol with Low Communication Complexity","authors":"Sara Ramezanian, Tommi Meskanen, M. Naderpour, Valtteri Niemi","doi":"10.1007/978-3-319-64701-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_3","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mind Your Right to Know: On De-anonymization Auditability in V2X Communications 注意你的知情权:论V2X通信中的去匿名化审计
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_47
Tommi Meskanen, M. Naderpour, Valtteri Niemi
{"title":"Mind Your Right to Know: On De-anonymization Auditability in V2X Communications","authors":"Tommi Meskanen, M. Naderpour, Valtteri Niemi","doi":"10.1007/978-3-319-64701-2_47","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_47","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131751840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks 利用AUTOSAR安全机制发动安全攻击
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_6
Ahmad M. K. Nasser, Di Ma, Sam Lauzon
{"title":"Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks","authors":"Ahmad M. K. Nasser, Di Ma, Sam Lauzon","doi":"10.1007/978-3-319-64701-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_6","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Dependably Detecting Geolocation of Cloud Servers 云服务器地理位置可靠检测研究
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_51
Leo Hippelainen, Ian Oliver, Shankar Lal
{"title":"Towards Dependably Detecting Geolocation of Cloud Servers","authors":"Leo Hippelainen, Ian Oliver, Shankar Lal","doi":"10.1007/978-3-319-64701-2_51","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_51","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133726277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信