International Conference on Security and Cryptography for Networks最新文献

筛选
英文 中文
Faster Maliciously Secure Two-Party Computation Using the GPU 使用GPU实现更快的恶意安全两方计算
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_21
T. Frederiksen, Thomas P. Jakobsen, J. Nielsen
{"title":"Faster Maliciously Secure Two-Party Computation Using the GPU","authors":"T. Frederiksen, Thomas P. Jakobsen, J. Nielsen","doi":"10.1007/978-3-319-10879-7_21","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_21","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Publicly Auditable Secure Multi-Party Computation 可公开审计的安全多方计算
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_11
Carsten Baum, I. Damgård, Claudio Orlandi
{"title":"Publicly Auditable Secure Multi-Party Computation","authors":"Carsten Baum, I. Damgård, Claudio Orlandi","doi":"10.1007/978-3-319-10879-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_11","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula 布尔公式的半自适应属性加密及改进委托
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_16
Jie Chen, H. Wee
{"title":"Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula","authors":"Jie Chen, H. Wee","doi":"10.1007/978-3-319-10879-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_16","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133378659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Forward Secure Non-Interactive Key Exchange 前向安全非交互式密钥交换
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_2
D. Pointcheval, Olivier Sanders
{"title":"Forward Secure Non-Interactive Key Exchange","authors":"D. Pointcheval, Olivier Sanders","doi":"10.1007/978-3-319-10879-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_2","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Homomorphic Signatures and Message Authentication Codes 同态签名和消息验证码
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_29
D. Catalano
{"title":"Homomorphic Signatures and Message Authentication Codes","authors":"D. Catalano","doi":"10.1007/978-3-319-10879-7_29","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_29","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Systematizing Secure Computation for Research and Decision Support 研究与决策支持的系统化安全计算
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_22
Jason Perry, Debayan Gupta, J. Feigenbaum, R. Wright
{"title":"Systematizing Secure Computation for Research and Decision Support","authors":"Jason Perry, Debayan Gupta, J. Feigenbaum, R. Wright","doi":"10.1007/978-3-319-10879-7_22","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_22","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114926392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks 对强化HMAC的一般攻击:n位安全HMAC要求所有块中都有密钥
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_19
Yu Sasaki, Lei Wang
{"title":"Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks","authors":"Yu Sasaki, Lei Wang","doi":"10.1007/978-3-319-10879-7_19","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_19","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved Indifferentiable Security Analysis of PHOTON 改进的光子不可微安全性分析
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_20
Yusuke Naito, K. Ohta
{"title":"Improved Indifferentiable Security Analysis of PHOTON","authors":"Yusuke Naito, K. Ohta","doi":"10.1007/978-3-319-10879-7_20","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_20","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131222381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficient NIZK Arguments via Parallel Verification of Benes Networks 基于Benes网络并行验证的有效NIZK参数
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_24
H. Lipmaa
{"title":"Efficient NIZK Arguments via Parallel Verification of Benes Networks","authors":"H. Lipmaa","doi":"10.1007/978-3-319-10879-7_24","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_24","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132589234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficient Network-Based Enforcement of Data Access Rights 基于网络的数据访问权的有效实施
International Conference on Security and Cryptography for Networks Pub Date : 2014-09-03 DOI: 10.1007/978-3-319-10879-7_14
P. Giura, V. Kolesnikov, Aris Tentes, Yevgeniy Vahlis
{"title":"Efficient Network-Based Enforcement of Data Access Rights","authors":"P. Giura, V. Kolesnikov, Aris Tentes, Yevgeniy Vahlis","doi":"10.1007/978-3-319-10879-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_14","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121873771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信