International Conference on Applied Cryptography and Network Security最新文献

筛选
英文 中文
Minting Mechanism for Proof of Stake Blockchains 权益证明区块链的铸币机制
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57808-4_16
Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
{"title":"Minting Mechanism for Proof of Stake Blockchains","authors":"Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan","doi":"10.1007/978-3-030-57808-4_16","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_16","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Same Point Composable and Nonmalleable Obfuscated Point Functions 同点可组合和不可延展模糊点函数
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_7
Peter Fenteany, Benjamin Fuller
{"title":"Same Point Composable and Nonmalleable Obfuscated Point Functions","authors":"Peter Fenteany, Benjamin Fuller","doi":"10.1007/978-3-030-57878-7_7","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_7","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131311212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
When TLS Meets Proxy on Mobile 当TLS在移动端遇到代理时
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_19
Joyanta Debnath, Sze Yiu Chau, Omar Chowdhury
{"title":"When TLS Meets Proxy on Mobile","authors":"Joyanta Debnath, Sze Yiu Chau, Omar Chowdhury","doi":"10.1007/978-3-030-57878-7_19","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_19","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131362638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cluster-Based Anonymization of Knowledge Graphs 基于聚类的知识图谱匿名化
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_6
A. Hoang, B. Carminati, E. Ferrari
{"title":"Cluster-Based Anonymization of Knowledge Graphs","authors":"A. Hoang, B. Carminati, E. Ferrari","doi":"10.1007/978-3-030-57878-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_6","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Quality Evaluation of Cyber Threat Intelligence Feeds 网络威胁情报馈送的质量评估
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_14
H. Griffioen, Tim M. Booij, C. Doerr
{"title":"Quality Evaluation of Cyber Threat Intelligence Feeds","authors":"H. Griffioen, Tim M. Booij, C. Doerr","doi":"10.1007/978-3-030-57878-7_14","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_14","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Human Factors in Homograph Attack Recognition 同形词攻击识别中的人为因素
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_20
Tran Thao Phuong, Y. Sawaya, Hoang-Quoc Nguyen-Son, A. Yamada, A. Kubota, Tran Van Sang, R. Yamaguchi
{"title":"Human Factors in Homograph Attack Recognition","authors":"Tran Thao Phuong, Y. Sawaya, Hoang-Quoc Nguyen-Son, A. Yamada, A. Kubota, Tran Van Sang, R. Yamaguchi","doi":"10.1007/978-3-030-57878-7_20","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_20","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134181974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode Lesamnta-LW重访:改进的原始和新的PRF模式的安全性分析
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57808-4_5
Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida
{"title":"Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode","authors":"Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida","doi":"10.1007/978-3-030-57808-4_5","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_5","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Anonymous Multi-group Broadcast Encryption 高效匿名多组广播加密
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57808-4_13
Intae Kim, S. Hwang, W. Susilo, J. Baek, Jongkil Kim
{"title":"Efficient Anonymous Multi-group Broadcast Encryption","authors":"Intae Kim, S. Hwang, W. Susilo, J. Baek, Jongkil Kim","doi":"10.1007/978-3-030-57808-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_13","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Publicly Evaluatable Perceptual Hashing 可公开评估的感知哈希
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_21
R. Gennaro, David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, W. E. Skeith, Anastasiia Timashova
{"title":"Publicly Evaluatable Perceptual Hashing","authors":"R. Gennaro, David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, W. E. Skeith, Anastasiia Timashova","doi":"10.1007/978-3-030-57878-7_21","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_21","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122792527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption 提高可再随机和可重放CCA安全公钥加密的效率
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57808-4_14
Antonio Faonio, D. Fiore
{"title":"Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption","authors":"Antonio Faonio, D. Fiore","doi":"10.1007/978-3-030-57808-4_14","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_14","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126978296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信