Foundations and Practice of Security最新文献

筛选
英文 中文
Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations 使用私有操作的最小卡数的基于卡的加密协议
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_13
Hibiki Ono, Yoshifumi Manabe
{"title":"Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations","authors":"Hibiki Ono, Yoshifumi Manabe","doi":"10.1007/978-3-030-18419-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mobile Travel Credentials 手机旅行凭证
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_4
David Bissessar, Maryam Hezaveh, Fayzah Alshammari, C. Adams
{"title":"Mobile Travel Credentials","authors":"David Bissessar, Maryam Hezaveh, Fayzah Alshammari, C. Adams","doi":"10.1007/978-3-030-18419-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130412193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Joins with MapReduce 安全连接MapReduce
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_6
Xavier Bultel, Radu Ciucanu, Matthieu Giraud, P. Lafourcade, Lihua Ye
{"title":"Secure Joins with MapReduce","authors":"Xavier Bultel, Radu Ciucanu, Matthieu Giraud, P. Lafourcade, Lihua Ye","doi":"10.1007/978-3-030-18419-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_6","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud Security Auditing: Major Approaches and Existing Challenges 云安全审计:主要方法和存在的挑战
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_5
Suryadipta Majumdar, Taous Madi, Yosr Jarraya, M. Pourzandi, Lingyu Wang, M. Debbabi
{"title":"Cloud Security Auditing: Major Approaches and Existing Challenges","authors":"Suryadipta Majumdar, Taous Madi, Yosr Jarraya, M. Pourzandi, Lingyu Wang, M. Debbabi","doi":"10.1007/978-3-030-18419-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_5","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128273294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fine-Grained Access Control for Microservices 微服务的细粒度访问控制
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_19
Antonio Nehme, Vitor Jesus, K. Mahbub, A. Abdallah
{"title":"Fine-Grained Access Control for Microservices","authors":"Antonio Nehme, Vitor Jesus, K. Mahbub, A. Abdallah","doi":"10.1007/978-3-030-18419-3_19","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_19","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Daedalus: Network Anomaly Detection on IDS Stream Logs 代达罗斯:IDS流日志的网络异常检测
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_7
A. Chohra, M. Debbabi, Paria Shirani
{"title":"Daedalus: Network Anomaly Detection on IDS Stream Logs","authors":"A. Chohra, M. Debbabi, Paria Shirani","doi":"10.1007/978-3-030-18419-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114586400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Ethical Challenges in Big Data 大数据中的隐私和道德挑战
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_2
S. Gambs
{"title":"Privacy and Ethical Challenges in Big Data","authors":"S. Gambs","doi":"10.1007/978-3-030-18419-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_2","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper) 验证云边缘物联网解决方案的访问控制需求(短文)
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_9
Tahir Ahmad, Silvio Ranise
{"title":"Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper)","authors":"Tahir Ahmad, Silvio Ranise","doi":"10.1007/978-3-030-18419-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Study Across Static and Dynamic Side-Channel Countermeasures 静态与动态侧信道对抗的比较研究
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_12
Yuri Gil Dantas, T. Hamann, H. Mantel
{"title":"A Comparative Study Across Static and Dynamic Side-Channel Countermeasures","authors":"Yuri Gil Dantas, T. Hamann, H. Mantel","doi":"10.1007/978-3-030-18419-3_12","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123774232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protection of Systems Against Fuzzing Attacks 保护系统免受模糊攻击
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_11
Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet
{"title":"Protection of Systems Against Fuzzing Attacks","authors":"Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet","doi":"10.1007/978-3-030-18419-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_11","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信