{"title":"Trust Management for CPS","authors":"W. Meng","doi":"10.1007/978-3-642-27739-9_1733-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1733-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Situational Awareness for CPS","authors":"C. Alcaráz","doi":"10.1007/978-3-642-27739-9_1732-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1732-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131814078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Security in the Age of Machine Learning","authors":"B. Tan","doi":"10.1007/978-3-642-27739-9_1651-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1651-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Tracking and Reidentification","authors":"Christoph Sommer","doi":"10.1007/978-3-642-27739-9_1536-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1536-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication Channel Anonymity","authors":"Simone Raponi, G. Oligeri","doi":"10.1007/springerreference_176","DOIUrl":"https://doi.org/10.1007/springerreference_176","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Verification of System-on-Chips (SoCs)","authors":"K. Basu","doi":"10.1007/978-3-642-27739-9_1647-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1647-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116098772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mehmet Nergi̇z, Maurizio Atzori, Christopher W. Clifton
{"title":"δ-Presence","authors":"Mehmet Nergi̇z, Maurizio Atzori, Christopher W. Clifton","doi":"10.1007/978-3-642-27739-9_1570-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1570-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122053803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-authority and Decentralized Attribute-Based Encryption","authors":"Yinbin Miao","doi":"10.1007/978-3-642-27739-9_1458-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1458-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121945131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Revocation in Identity-Based Encryption and Attribute-Based Encryption","authors":"Baodong Qin","doi":"10.1007/978-3-642-27739-9_1455-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1455-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}