Encyclopedia of Cryptography and Security最新文献

筛选
英文 中文
Stack (Buffer) Overflow 栈(缓冲区)溢出
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_1172
C. Adams, M. Stephens, E. Gabidulin, D. Boneh, Mike Just, C. Ardagna, E. Damiani, C. Fontaine, P. England, Ali Bagherzandi, B. Hore, S. Mehrotra, B. Preneel, Laurent Bussard, G. R. Blakley, G. Kabatiansky, Gerardo Pelosi, Sangwon Hyun, P. Ning, Sean Smith, Wensheng Zhang, R. Sion, Ming Li, W. Lou, Kui Ren, M. Vauclair, Donggang Liu, Keith B. Frikken, C. Nita-Rotaru, Reza Curtmola, Jing Dong, Qijun Gu, C. Heinrich, Kun Sun, Panos Papadimitratos, Jean-Pierre Hubaux, F. L. Bauer, Marijke DeSoete, T. Caddy, Sachiko Yoshihama, T. Oh, Shinyoung Lim, Young-Bok Choi, J. Ryoo, Jung-Min “Jerry” Park, Ka Bian, Srdjan Capkun, Mehdi Tibouchi, R. Housley, G. Bleumer, Caroline Fontain, Kazue Sako, Yi Yang, Sencun Zhu, Ms. Yi Yang, Marijke De Soete, Mary Ellen Zurko, Richard T. Simon, T. Helleseth, Christophe De Cannière, Martin Johns, H. Handschuh, H. van Tilborg, D. Micciancio, M. Joye, Francis Olivier, B. Kaliski, Emmanuel Thomé, Berry Schoenmakers, P. Campisi, E. Maiorana, A. Neri, Y. Dodis, Bodo Möller, A. Biryukov,
{"title":"Stack (Buffer) Overflow","authors":"C. Adams, M. Stephens, E. Gabidulin, D. Boneh, Mike Just, C. Ardagna, E. Damiani, C. Fontaine, P. England, Ali Bagherzandi, B. Hore, S. Mehrotra, B. Preneel, Laurent Bussard, G. R. Blakley, G. Kabatiansky, Gerardo Pelosi, Sangwon Hyun, P. Ning, Sean Smith, Wensheng Zhang, R. Sion, Ming Li, W. Lou, Kui Ren, M. Vauclair, Donggang Liu, Keith B. Frikken, C. Nita-Rotaru, Reza Curtmola, Jing Dong, Qijun Gu, C. Heinrich, Kun Sun, Panos Papadimitratos, Jean-Pierre Hubaux, F. L. Bauer, Marijke DeSoete, T. Caddy, Sachiko Yoshihama, T. Oh, Shinyoung Lim, Young-Bok Choi, J. Ryoo, Jung-Min “Jerry” Park, Ka Bian, Srdjan Capkun, Mehdi Tibouchi, R. Housley, G. Bleumer, Caroline Fontain, Kazue Sako, Yi Yang, Sencun Zhu, Ms. Yi Yang, Marijke De Soete, Mary Ellen Zurko, Richard T. Simon, T. Helleseth, Christophe De Cannière, Martin Johns, H. Handschuh, H. van Tilborg, D. Micciancio, M. Joye, Francis Olivier, B. Kaliski, Emmanuel Thomé, Berry Schoenmakers, P. Campisi, E. Maiorana, A. Neri, Y. Dodis, Bodo Möller, A. Biryukov,","doi":"10.1007/978-1-4419-5906-5_1172","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1172","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128674322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Digital Signature Scheme Based on McEliece 基于McEliece的数字签名方案
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_380
M. Finiasz, N. Sendrier
{"title":"Digital Signature Scheme Based on McEliece","authors":"M. Finiasz, N. Sendrier","doi":"10.1007/978-1-4419-5906-5_380","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_380","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128986841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unpacking Malware 拆包的恶意软件
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_851
Brent Byunghoon Kang, G. Sinclair
{"title":"Unpacking Malware","authors":"Brent Byunghoon Kang, G. Sinclair","doi":"10.1007/978-1-4419-5906-5_851","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_851","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pairing-Friendly Elliptic Curves 配对友好型椭圆曲线
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_256
Edlyn Teske
{"title":"Pairing-Friendly Elliptic Curves","authors":"Edlyn Teske","doi":"10.1007/978-1-4419-5906-5_256","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_256","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Mining (Privacy in) 数据挖掘(私隐)
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_751
C. Aggarwal
{"title":"Data Mining (Privacy in)","authors":"C. Aggarwal","doi":"10.1007/978-1-4419-5906-5_751","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_751","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129901063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Record Linkage 记录链接
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_1281
D. Pointcheval, D. Boneh, J. Quisquater, David Samyde, Gerald Brose, M. Bucci, T. Caddy, G. Bleumer, E. Gabidulin, C. Fontaine, H. Handschuh, P. Samarati, P. Charpin, Trent Jaeger, A.Yu. Biryukov, B. Kaliski, Y. Desmedt, Carlisle M. Adams, M. Polychronakis, David Naccache, Gildas Avoine, Bodo Möller, J. Daemen, V. Rijmen, A. Bosselaers, V. Alturi, D. Ferraiolo, A. Campi, W. Casper, S. Papa, Padmaraj M. V. Nair, Ronald L. Rivest, T. Helleseth, A. Canteaut
{"title":"Record Linkage","authors":"D. Pointcheval, D. Boneh, J. Quisquater, David Samyde, Gerald Brose, M. Bucci, T. Caddy, G. Bleumer, E. Gabidulin, C. Fontaine, H. Handschuh, P. Samarati, P. Charpin, Trent Jaeger, A.Yu. Biryukov, B. Kaliski, Y. Desmedt, Carlisle M. Adams, M. Polychronakis, David Naccache, Gildas Avoine, Bodo Möller, J. Daemen, V. Rijmen, A. Bosselaers, V. Alturi, D. Ferraiolo, A. Campi, W. Casper, S. Papa, Padmaraj M. V. Nair, Ronald L. Rivest, T. Helleseth, A. Canteaut","doi":"10.1007/978-1-4419-5906-5_1281","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1281","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iceman Attack 冰人攻击
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_1015
{"title":"Iceman Attack","authors":"","doi":"10.1007/978-1-4419-5906-5_1015","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1015","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130367880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blum Integer 布卢姆整数
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_397
Burton S. Kaliski
{"title":"Blum Integer","authors":"Burton S. Kaliski","doi":"10.1007/978-1-4419-5906-5_397","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_397","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130535337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Enhanced Languages Privacy-Enhanced语言
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_1381
{"title":"Privacy-Enhanced Languages","authors":"","doi":"10.1007/978-1-4419-5906-5_1381","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1381","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1984 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong Exclusion 强烈的排斥
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_1346
{"title":"Strong Exclusion","authors":"","doi":"10.1007/978-1-4419-5906-5_1346","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1346","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信