ACNS Workshops最新文献

筛选
英文 中文
Tokenization of Real Estate Using Blockchain Technology 使用区块链技术的房地产代币化
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_5
Ashutosh Gupta, Jash Rathod, Dhiren R. Patel, Jay Bothra, S. Shanbhag, Tanmay Bhalerao
{"title":"Tokenization of Real Estate Using Blockchain Technology","authors":"Ashutosh Gupta, Jash Rathod, Dhiren R. Patel, Jay Bothra, S. Shanbhag, Tanmay Bhalerao","doi":"10.1007/978-3-030-61638-0_5","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_5","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121252035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Applications and Developments of the Lattice Attack in Side Channel Attacks 点阵攻击在侧信道攻击中的应用与发展
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_24
Ziqiang Ma, Bingyu Li, Quanwei Cai, Jun Yang
{"title":"Applications and Developments of the Lattice Attack in Side Channel Attacks","authors":"Ziqiang Ma, Bingyu Li, Quanwei Cai, Jun Yang","doi":"10.1007/978-3-030-61638-0_24","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_24","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leakage Assessment Through Neural Estimation of the Mutual Information 基于互信息神经估计的泄漏评估
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_9
Valence Cristiani, Maxime Lecomte, P. Maurine
{"title":"Leakage Assessment Through Neural Estimation of the Mutual Information","authors":"Valence Cristiani, Maxime Lecomte, P. Maurine","doi":"10.1007/978-3-030-61638-0_9","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_9","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm 基于树的机器学习算法的实用边信道模型提取攻击
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_6
Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, S. Bhasin, N. Homma
{"title":"Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm","authors":"Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, S. Bhasin, N. Homma","doi":"10.1007/978-3-030-61638-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_6","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation 具有验证者-本地撤销的完全匿名格群签名方案的新零知识证明
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_21
Yanhua Zhang, Ximeng Liu, Yifeng Yin, Qikun Zhang, Huiwen Jia
{"title":"On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation","authors":"Yanhua Zhang, Ximeng Liu, Yifeng Yin, Qikun Zhang, Huiwen Jia","doi":"10.1007/978-3-030-61638-0_21","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_21","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"412 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131644978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks 针对深度神经网络激活函数的简单电磁分析
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_11
Go Takatoi, T. Sugawara, K. Sakiyama, Y. Li
{"title":"Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks","authors":"Go Takatoi, T. Sugawara, K. Sakiyama, Y. Li","doi":"10.1007/978-3-030-61638-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_11","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120981913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Inclusive Privacy Protections in the Cloud 实现云中的包容性隐私保护
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_19
Tanusree Sharma, Tian Wang, C. D. Giulio, Masooda N. Bashir
{"title":"Towards Inclusive Privacy Protections in the Cloud","authors":"Tanusree Sharma, Tian Wang, C. D. Giulio, Masooda N. Bashir","doi":"10.1007/978-3-030-61638-0_19","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_19","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126147514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computing Neural Networks with Homomorphic Encryption and Verifiable Computing 基于同态加密和可验证计算的计算神经网络
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_17
Abbass Madi, Renaud Sirdey, Oana Stan
{"title":"Computing Neural Networks with Homomorphic Encryption and Verifiable Computing","authors":"Abbass Madi, Renaud Sirdey, Oana Stan","doi":"10.1007/978-3-030-61638-0_17","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_17","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Bitcoin Blockchain Steganographic Analysis 比特币区块链隐写分析
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_3
A. Giron, J. E. Martina, Ricardo Felipe Custódio
{"title":"Bitcoin Blockchain Steganographic Analysis","authors":"A. Giron, J. E. Martina, Ricardo Felipe Custódio","doi":"10.1007/978-3-030-61638-0_3","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_3","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127599876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density Matching 基于密度匹配的被盗手写数字嵌入的无监督标记
ACNS Workshops Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-61638-0_30
Thomas Thebaud, Gaël Le Lan, A. Larcher
{"title":"Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density Matching","authors":"Thomas Thebaud, Gaël Le Lan, A. Larcher","doi":"10.1007/978-3-030-61638-0_30","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_30","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信