ACNS Workshops最新文献

筛选
英文 中文
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain 使用puf和区块链的需求操纵攻击弹性隐私感知智能电网
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81645-2_15
Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey
{"title":"Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain","authors":"Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey","doi":"10.1007/978-3-030-81645-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-81645-2_15","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128880309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shaping Blockchain Technology for Securing Supply Chains 塑造区块链技术,确保供应链安全
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81645-2_1
Li Zhi, Jianying Zhou, Martin Saerbeck
{"title":"Shaping Blockchain Technology for Securing Supply Chains","authors":"Li Zhi, Jianying Zhou, Martin Saerbeck","doi":"10.1007/978-3-030-81645-2_1","DOIUrl":"https://doi.org/10.1007/978-3-030-81645-2_1","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum Computing Threat Modelling on a Generic CPS Setup 基于通用CPS设置的量子计算威胁建模
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81645-2_11
Cher Chye Lee, Teik Guan Tan, Vishally Sharma, Jianying Zhou
{"title":"Quantum Computing Threat Modelling on a Generic CPS Setup","authors":"Cher Chye Lee, Teik Guan Tan, Vishally Sharma, Jianying Zhou","doi":"10.1007/978-3-030-81645-2_11","DOIUrl":"https://doi.org/10.1007/978-3-030-81645-2_11","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126453489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things 海报:ODABE:外包分散的CP-ABE在物联网
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_35
M. Kamel, P. Ligeti, C. Reich
{"title":"POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things","authors":"M. Kamel, P. Ligeti, C. Reich","doi":"10.1007/978-3-031-16815-4_35","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_35","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122983760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures 对动态生成无效签名的设备具有可追溯性的聚合签名
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81645-2_22
Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Takahiro Matsuda, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto
{"title":"Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures","authors":"Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Takahiro Matsuda, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto","doi":"10.1007/978-3-030-81645-2_22","DOIUrl":"https://doi.org/10.1007/978-3-030-81645-2_22","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127609219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud? BFV, CKKS, TFHE:哪个是云环境下安全神经网络评估的最佳选择?
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81645-2_16
Pierre-Emmanuel Clet, Oana Stan, Martin Zuber
{"title":"BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud?","authors":"Pierre-Emmanuel Clet, Oana Stan, Martin Zuber","doi":"10.1007/978-3-030-81645-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-81645-2_16","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434 基于ISO/SAE 21434的道路车辆威胁剩余网络安全风险计算框架
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_14
Ahmed Khan, J. Bryans, Giedre Sabaliauskaite
{"title":"Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434","authors":"Ahmed Khan, J. Bryans, Giedre Sabaliauskaite","doi":"10.1007/978-3-031-16815-4_14","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_14","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps WiP:工业环境中基于TCP/ ip连接的分布式入侵检测系统
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81645-2_14
A. Kharitonov, Axel Zimmermann
{"title":"WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps","authors":"A. Kharitonov, Axel Zimmermann","doi":"10.1007/978-3-030-81645-2_14","DOIUrl":"https://doi.org/10.1007/978-3-030-81645-2_14","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121018868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable and Secure HTML5 Canvas-Based User Authentication 可扩展和安全的HTML5基于画布的用户身份验证
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_30
Esteban Rivera, Lizzy Tengana, Jesus Solano, Christian Lopez, J. Flórez, Martín Ochoa
{"title":"Scalable and Secure HTML5 Canvas-Based User Authentication","authors":"Esteban Rivera, Lizzy Tengana, Jesus Solano, Christian Lopez, J. Flórez, Martín Ochoa","doi":"10.1007/978-3-031-16815-4_30","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_30","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the Security of Certificate Transparency in the Wild 探索野外证书透明度的安全性
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-61638-0_25
Bingyu Li, Fengjun Li, Ziqiang Ma, Qianhong Wu
{"title":"Exploring the Security of Certificate Transparency in the Wild","authors":"Bingyu Li, Fengjun Li, Ziqiang Ma, Qianhong Wu","doi":"10.1007/978-3-030-61638-0_25","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_25","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117033601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信