International Conference on Security and Cryptography for Networks最新文献

筛选
英文 中文
How (Not) to Instantiate Ring-LWE 如何(不)实例化Ring-LWE
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_22
Chris Peikert
{"title":"How (Not) to Instantiate Ring-LWE","authors":"Chris Peikert","doi":"10.1007/978-3-319-44618-9_22","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_22","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114968880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Proactive Secret Sharing with a Dishonest Majority 主动与不诚实的大多数人分享秘密
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_28
S. Dolev, Karim M. El Defrawy, Joshua Lampkins, R. Ostrovsky, M. Yung
{"title":"Proactive Secret Sharing with a Dishonest Majority","authors":"S. Dolev, Karim M. El Defrawy, Joshua Lampkins, R. Ostrovsky, M. Yung","doi":"10.1007/978-3-319-44618-9_28","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_28","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"128 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Feasibility of Outsourced Database Search in the Plain Model 平原模式下外包数据库搜索的可行性
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_17
Carmit Hazay, Hila Zarosim
{"title":"The Feasibility of Outsourced Database Search in the Plain Model","authors":"Carmit Hazay, Hila Zarosim","doi":"10.1007/978-3-319-44618-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_17","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Verifiable Pattern Matching on Outsourced Texts 外包文本的可验证模式匹配
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_18
D. Catalano, M. Raimondo, S. Faro
{"title":"Verifiable Pattern Matching on Outsourced Texts","authors":"D. Catalano, M. Raimondo, S. Faro","doi":"10.1007/978-3-319-44618-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_18","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees 全动态列表和树的可验证零知识顺序查询和更新
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_12
Esha Ghosh, M. Goodrich, O. Ohrimenko, R. Tamassia
{"title":"Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees","authors":"Esha Ghosh, M. Goodrich, O. Ohrimenko, R. Tamassia","doi":"10.1007/978-3-319-44618-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_12","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On Adaptively Secure Multiparty Computation with a Short CRS 短CRS的自适应安全多方计算
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_7
Ran Cohen, Chris Peikert
{"title":"On Adaptively Secure Multiparty Computation with a Short CRS","authors":"Ran Cohen, Chris Peikert","doi":"10.1007/978-3-319-44618-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_7","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bounded KDM Security from iO and OWF iO和OWF的有界KDM安全性
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_30
Antonio Marcedone, R. Pass, Abhi Shelat
{"title":"Bounded KDM Security from iO and OWF","authors":"Antonio Marcedone, R. Pass, Abhi Shelat","doi":"10.1007/978-3-319-44618-9_30","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_30","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"418 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133971333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Provably-Secure Remote Memory Attestation for Heap Overflow Protection 堆溢出保护的可证明安全的远程内存认证
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_5
A. Boldyreva, Taesoo Kim, R. Lipton, B. Warinschi
{"title":"Provably-Secure Remote Memory Attestation for Heap Overflow Protection","authors":"A. Boldyreva, Taesoo Kim, R. Lipton, B. Warinschi","doi":"10.1007/978-3-319-44618-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_5","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124239569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Zero-Knowledge Made Easy so It Won't Make You Dizzy - (A Tale of Transaction Put in Verse About an Illicit Kind of Commerce) 零知识变得简单,不会让你感到头晕——(一个关于非法商业的诗歌交易故事)
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_10
Trotta Gnam
{"title":"Zero-Knowledge Made Easy so It Won't Make You Dizzy - (A Tale of Transaction Put in Verse About an Illicit Kind of Commerce)","authors":"Trotta Gnam","doi":"10.1007/978-3-319-44618-9_10","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_10","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing 使用预处理的线性开销最优弹性鲁棒MPC
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_8
Ashish Choudhury, Emmanuela Orsini, A. Patra, N. Smart
{"title":"Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing","authors":"Ashish Choudhury, Emmanuela Orsini, A. Patra, N. Smart","doi":"10.1007/978-3-319-44618-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_8","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121182913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信