Foundations and Practice of Security最新文献

筛选
英文 中文
A Privacy Protection Layer for Wearable Devices 可穿戴设备的隐私保护层
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_24
Muhammad Mohzary, Srikanth Tadisetty, Kambiz Ghazinour
{"title":"A Privacy Protection Layer for Wearable Devices","authors":"Muhammad Mohzary, Srikanth Tadisetty, Kambiz Ghazinour","doi":"10.1007/978-3-030-45371-8_24","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_24","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134459566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE TATIS:与UMA和CP-ABE共享威胁情报的可靠api
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_11
D. Preuveneers, W. Joosen
{"title":"TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE","authors":"D. Preuveneers, W. Joosen","doi":"10.1007/978-3-030-45371-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_11","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enroll, and Authentication Will Follow - eID-Based Enrollment for a Customized, Secure, and Frictionless Authentication Experience 注册和身份验证将遵循基于eid的注册,以获得自定义,安全和无摩擦的身份验证体验
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_10
Silvio Ranise, Giada Sciarretta, A. Tomasi
{"title":"Enroll, and Authentication Will Follow - eID-Based Enrollment for a Customized, Secure, and Frictionless Authentication Experience","authors":"Silvio Ranise, Giada Sciarretta, A. Tomasi","doi":"10.1007/978-3-030-45371-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Identification Scheme Based on Rank Metric 一种基于等级度量的有效识别方案
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_17
Edoukou Berenger Ayebie, Hafsa Assidi, E. M. Souidi
{"title":"An Efficient Identification Scheme Based on Rank Metric","authors":"Edoukou Berenger Ayebie, Hafsa Assidi, E. M. Souidi","doi":"10.1007/978-3-030-45371-8_17","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_17","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Android Apps from Repackaging Using Native Code 使用原生代码保护Android应用程序不被重新打包
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_12
Simon Tanner, Ilian Vogels, Roger Wattenhofer
{"title":"Protecting Android Apps from Repackaging Using Native Code","authors":"Simon Tanner, Ilian Vogels, Roger Wattenhofer","doi":"10.1007/978-3-030-45371-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121351054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards Secure TMIS Protocols 迈向安全的TMIS协议
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_21
David Gérault, P. Lafourcade
{"title":"Towards Secure TMIS Protocols","authors":"David Gérault, P. Lafourcade","doi":"10.1007/978-3-030-45371-8_21","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_21","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Attribute Retrieval in ABAC ABAC中的属性检索
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_14
C. Morisset, Sowmya Ravidas, Nicola Zannone
{"title":"On Attribute Retrieval in ABAC","authors":"C. Morisset, Sowmya Ravidas, Nicola Zannone","doi":"10.1007/978-3-030-45371-8_14","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Get-your-ID: Decentralized Proof of Identity Get-your-ID:分散的身份证明
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_20
P. Lafourcade, Marius Lombard-Platet
{"title":"Get-your-ID: Decentralized Proof of Identity","authors":"P. Lafourcade, Marius Lombard-Platet","doi":"10.1007/978-3-030-45371-8_20","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_20","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123902761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Validating the DFA Attack Resistance of AES (Short Paper) 验证AES的DFA抗攻击能力(短文)
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_25
Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, K. Sakiyama
{"title":"Validating the DFA Attack Resistance of AES (Short Paper)","authors":"Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, K. Sakiyama","doi":"10.1007/978-3-030-45371-8_25","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_25","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"281 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Selection and Performance Analysis of CICIDS2017 Features Importance CICIDS2017特性选择与性能分析
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_4
Bruno Reis, Eva Maia, Isabel Praça
{"title":"Selection and Performance Analysis of CICIDS2017 Features Importance","authors":"Bruno Reis, Eva Maia, Isabel Praça","doi":"10.1007/978-3-030-45371-8_4","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122359083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信