Encyclopedia of Cryptography, Security and Privacy最新文献

筛选
英文 中文
Amplification DoS Attacks 放大DoS攻击
Encyclopedia of Cryptography, Security and Privacy Pub Date : 2020-12-23 DOI: 10.1007/978-3-642-27739-9_1486-1
M. Anagnostopoulos
{"title":"Amplification DoS Attacks","authors":"M. Anagnostopoulos","doi":"10.1007/978-3-642-27739-9_1486-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1486-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Salt
Encyclopedia of Cryptography, Security and Privacy Pub Date : 2018-10-04 DOI: 10.2307/j.ctt22nmcfb.9
C. Adams
{"title":"Salt","authors":"C. Adams","doi":"10.2307/j.ctt22nmcfb.9","DOIUrl":"https://doi.org/10.2307/j.ctt22nmcfb.9","url":null,"abstract":"Conventional solid-state nanopore measurements sense all translocating entities, necessitating meticulous analysis to differentiate target biomolecules. To address this, we have established a selective assay with the platform that has shown utility in quantifying several nucleic acid biomarkers. However, limited detection efficiency and intrinsic noise have so far limited assay resolution to 10 nM. Improvements in this value require manipulation of translocation dynamics. Here, we report the effects of NaCl conditions on assay performance. We first investigate symmetric conditions, finding sensitivity increases with salt concentration but selectivity is maximized at 1.0 M NaCl. We then probe asymmetric conditions, showing a remarkable impact on assay sensitivity and selectivity when measurement buffer NaCl concentration in the reservoir with the translocating molecules is low and the opposite reservoir is increased. Using optimum conditions, we demonstrate detection of target biomolecules down to a concentration of 100 pM which is an improvement of 2 orders of magnitude over past results.","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Rights and Cybersecurity 人权与网络安全
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1584-1
A. Phippen, E. Bond
{"title":"Human Rights and Cybersecurity","authors":"A. Phippen, E. Bond","doi":"10.1007/978-3-642-27739-9_1584-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1584-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polyinstantiation 多实例化
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_682-2
Sabrina De Capitani di Vimercati, Pierangela Samarati
{"title":"Polyinstantiation","authors":"Sabrina De Capitani di Vimercati, Pierangela Samarati","doi":"10.1007/978-3-642-27739-9_682-2","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_682-2","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"46 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123263721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometric Matching 生物特征匹配
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1520-1
Damon L. Woodard
{"title":"Biometric Matching","authors":"Damon L. Woodard","doi":"10.1007/978-3-642-27739-9_1520-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1520-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130380764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Sample Quality 生物识别样品质量
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/springerreference_70891
N. Poh
{"title":"Biometric Sample Quality","authors":"N. Poh","doi":"10.1007/springerreference_70891","DOIUrl":"https://doi.org/10.1007/springerreference_70891","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Encryption 生物特征加密
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1519-1
A. Uhl, C. Rathgeb
{"title":"Biometric Encryption","authors":"A. Uhl, C. Rathgeb","doi":"10.1007/978-3-642-27739-9_1519-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1519-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126372817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience in CPS CPS的弹性
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1728-1
Francesco Flammini
{"title":"Resilience in CPS","authors":"Francesco Flammini","doi":"10.1007/978-3-642-27739-9_1728-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1728-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicular Privacy 车辆的隐私
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1529-1
D. Eckhoff
{"title":"Vehicular Privacy","authors":"D. Eckhoff","doi":"10.1007/978-3-642-27739-9_1529-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1529-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115851045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economics of Software Vulnerability Markets 软件漏洞市场经济学
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1616-1
Vasilios Katos, Cosmin Ciobanu
{"title":"Economics of Software Vulnerability Markets","authors":"Vasilios Katos, Cosmin Ciobanu","doi":"10.1007/978-3-642-27739-9_1616-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1616-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131054008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信