ACNS Workshops最新文献

筛选
英文 中文
On the Evolution of Security Issues in Android App Versions Android应用版本安全问题演变研究
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-61638-0_29
Anatoli Kalysch, Joschua Schilling, Tilo Müller
{"title":"On the Evolution of Security Issues in Android App Versions","authors":"Anatoli Kalysch, Joschua Schilling, Tilo Müller","doi":"10.1007/978-3-030-61638-0_29","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_29","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RATLS: Integrating Transport Layer Security with Remote Attestation RATLS:集成传输层安全性和远程认证
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_20
Robert Walther, C. Weinhold, M. Roitzsch
{"title":"RATLS: Integrating Transport Layer Security with Remote Attestation","authors":"Robert Walther, C. Weinhold, M. Roitzsch","doi":"10.1007/978-3-031-16815-4_20","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_20","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124998286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Etiology of Cybersecurity 网络安全的病因学
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_17
Michele Ambrosi, Francesco Beltramini, F. Meo, Oliviero Nardi, Mattia Pacchin, M. Rocchetto
{"title":"The Etiology of Cybersecurity","authors":"Michele Ambrosi, Francesco Beltramini, F. Meo, Oliviero Nardi, Mattia Pacchin, M. Rocchetto","doi":"10.1007/978-3-031-16815-4_17","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_17","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"52 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120808947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-exploitation and Persistence Techniques Against Programmable Logic Controller 针对可编程逻辑控制器的后开发和持久化技术
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-61638-0_15
Andrei Bytes, Jianying Zhou
{"title":"Post-exploitation and Persistence Techniques Against Programmable Logic Controller","authors":"Andrei Bytes, Jianying Zhou","doi":"10.1007/978-3-030-61638-0_15","DOIUrl":"https://doi.org/10.1007/978-3-030-61638-0_15","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115223952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leaky Blinders: Information Leakage in Mobile VPNs 漏眼罩:移动vpn中的信息泄漏
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_26
Thijs Heijligenberg, Oualid Lkhaouni, K. Kohls
{"title":"Leaky Blinders: Information Leakage in Mobile VPNs","authors":"Thijs Heijligenberg, Oualid Lkhaouni, K. Kohls","doi":"10.1007/978-3-031-16815-4_26","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_26","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125366343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning 基于后向贝叶斯主动学习的智能合约漏洞检测
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_5
Jiale Zhang, Liangqiong Tu, Jie Cai, Xiaobing Sun, Bin Li, Weitong Chen, Yu Wang
{"title":"Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning","authors":"Jiale Zhang, Liangqiong Tu, Jie Cai, Xiaobing Sun, Bin Li, Weitong Chen, Yu Wang","doi":"10.1007/978-3-031-16815-4_5","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_5","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
POSTER: LHSA: Lightweight Hardware Security Arbitrator 海报:LHSA:轻量级硬件安全仲裁员
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81645-2_28
Yongjin Kim
{"title":"POSTER: LHSA: Lightweight Hardware Security Arbitrator","authors":"Yongjin Kim","doi":"10.1007/978-3-030-81645-2_28","DOIUrl":"https://doi.org/10.1007/978-3-030-81645-2_28","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Siamese Neural Network for Scalable Behavioral Biometrics Authentication 基于Siamese神经网络的可扩展行为生物识别认证
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_28
Jesus Solano, Esteban Rivera, Lizzy Tengana, Christian Lopez, J. Flórez, Martín Ochoa
{"title":"A Siamese Neural Network for Scalable Behavioral Biometrics Authentication","authors":"Jesus Solano, Esteban Rivera, Lizzy Tengana, Christian Lopez, J. Flórez, Martín Ochoa","doi":"10.1007/978-3-031-16815-4_28","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_28","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115787371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Demystifying Adversarial Robustness of Binarized Neural Networks 二值化神经网络的对抗鲁棒性探析
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81645-2_25
Zihao Qin, Hsiao-Ying Lin, Jie Shi
{"title":"Towards Demystifying Adversarial Robustness of Binarized Neural Networks","authors":"Zihao Qin, Hsiao-Ying Lin, Jie Shi","doi":"10.1007/978-3-030-81645-2_25","DOIUrl":"https://doi.org/10.1007/978-3-030-81645-2_25","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers PEPEC:预先计算的ECC点嵌入证书并由CT日志服务器验证
ACNS Workshops Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-16815-4_24
Guangsheng Cheng, Jiankuo Dong, Xinyi Ji, Bingyu Li, Haoling Fan, Pinchang Zhang
{"title":"PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers","authors":"Guangsheng Cheng, Jiankuo Dong, Xinyi Ji, Bingyu Li, Haoling Fan, Pinchang Zhang","doi":"10.1007/978-3-031-16815-4_24","DOIUrl":"https://doi.org/10.1007/978-3-031-16815-4_24","url":null,"abstract":"","PeriodicalId":406001,"journal":{"name":"ACNS Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134235937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信