International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage最新文献

筛选
英文 中文
Blockchain-Based Mobility Management for LTE and Beyond 基于区块链的LTE及以后移动管理
Han Lee, M. Ma
{"title":"Blockchain-Based Mobility Management for LTE and Beyond","authors":"Han Lee, M. Ma","doi":"10.1007/978-3-030-24907-6_4","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_4","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography 使用抗打印扫描图像哈希和公钥加密的纸质文档身份验证
Fawad Ahmad, Lee-Ming Cheng
{"title":"Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography","authors":"Fawad Ahmad, Lee-Ming Cheng","doi":"10.1007/978-3-030-24907-6_13","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_13","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking 软件定义网络中攻击感知恢复控制器-交换链路成本最小化放置算法
Cheng Qin, S. C. Tan, C. K. Lee, Z. Yusoff, Rizaluddin Kaspin
{"title":"Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking","authors":"Cheng Qin, S. C. Tan, C. K. Lee, Z. Yusoff, Rizaluddin Kaspin","doi":"10.1007/978-3-030-24907-6_23","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_23","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127672470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Leakage in Wearable Applications 可穿戴应用中的信息泄露
Babatunde Olabenjo, D. Makaroff
{"title":"Information Leakage in Wearable Applications","authors":"Babatunde Olabenjo, D. Makaroff","doi":"10.1007/978-3-030-24907-6_17","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_17","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133553212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Protection Labware for Mobile Security 移动安全数据保护实验室软件
H. Shahriar, Md Arabin Islam Talukder, H. Chi, M. Rahman, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi
{"title":"Data Protection Labware for Mobile Security","authors":"H. Shahriar, Md Arabin Islam Talukder, H. Chi, M. Rahman, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi","doi":"10.1007/978-3-030-24907-6_15","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_15","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data 触摸分析:触摸数据的机器学习分类算法的经验评估
M. Montgomery, Prosenjit Chatterjee, John Jenkins, K. Roy
{"title":"Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data","authors":"M. Montgomery, Prosenjit Chatterjee, John Jenkins, K. Roy","doi":"10.1007/978-3-030-24907-6_12","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_12","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122354958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT TLShps:物联网基于sdn的TLS握手协议简化
Lei Yan, M. Ma, Yan Ma
{"title":"TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT","authors":"Lei Yan, M. Ma, Yan Ma","doi":"10.1007/978-3-030-24907-6_14","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_14","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EPT: EDNS Privacy Tunnel for DNS EPT:用于DNS的EDNS隐私隧道
Lanlan Pan, Jie Chen, Anlei Hu, Xuebiao Yuchi
{"title":"EPT: EDNS Privacy Tunnel for DNS","authors":"Lanlan Pan, Jie Chen, Anlei Hu, Xuebiao Yuchi","doi":"10.1007/978-3-030-24907-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_5","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123351103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characteristics of Bitcoin Transactions on Cryptomarkets 加密市场上比特币交易的特征
Xucan Chen, M. Hasan, Xintao Wu, P. Skums, M. Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon, Yubao Wu
{"title":"Characteristics of Bitcoin Transactions on Cryptomarkets","authors":"Xucan Chen, M. Hasan, Xintao Wu, P. Skums, M. Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon, Yubao Wu","doi":"10.1007/978-3-030-24907-6_20","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_20","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123361278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Verifiable Fully Homomorphic Encryption Scheme 一个可验证的全同态加密方案
Ruwei Huang, Zhikun Li, Jianan Zhao
{"title":"A Verifiable Fully Homomorphic Encryption Scheme","authors":"Ruwei Huang, Zhikun Li, Jianan Zhao","doi":"10.1007/978-3-030-24907-6_31","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_31","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134020802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信