International Conference on Applied Cryptography and Network Security最新文献

筛选
英文 中文
VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation VeriCount:使用硬件和软件隔离的可验证资源会计
International Conference on Applied Cryptography and Network Security Pub Date : 2018-07-02 DOI: 10.1007/978-3-319-93387-0_34
Shruti Tople, Soyeon Park, M. Kang, P. Saxena
{"title":"VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation","authors":"Shruti Tople, Soyeon Park, M. Kang, P. Saxena","doi":"10.1007/978-3-319-93387-0_34","DOIUrl":"https://doi.org/10.1007/978-3-319-93387-0_34","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132390518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices 基于格的几乎紧密多实例多密文身份加密
International Conference on Applied Cryptography and Network Security Pub Date : 2018-07-02 DOI: 10.1007/978-3-319-93387-0_28
Xavier Boyen, Qinyi Li
{"title":"Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices","authors":"Xavier Boyen, Qinyi Li","doi":"10.1007/978-3-319-93387-0_28","DOIUrl":"https://doi.org/10.1007/978-3-319-93387-0_28","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PassGAN: A Deep Learning Approach for Password Guessing PassGAN:密码猜测的深度学习方法
International Conference on Applied Cryptography and Network Security Pub Date : 2017-09-01 DOI: 10.1007/978-3-030-21568-2_11
B. Hitaj, Paolo Gasti, G. Ateniese, F. Pérez-Cruz
{"title":"PassGAN: A Deep Learning Approach for Password Guessing","authors":"B. Hitaj, Paolo Gasti, G. Ateniese, F. Pérez-Cruz","doi":"10.1007/978-3-030-21568-2_11","DOIUrl":"https://doi.org/10.1007/978-3-030-21568-2_11","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 180
Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric 认证:用户身份验证和午餐时间攻击缓解与坐姿生物识别
International Conference on Applied Cryptography and Network Security Pub Date : 2017-08-14 DOI: 10.1007/978-3-319-93387-0_32
Tyler Kaczmarek, Ercan Ozturk, G. Tsudik
{"title":"Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric","authors":"Tyler Kaczmarek, Ercan Ozturk, G. Tsudik","doi":"10.1007/978-3-319-93387-0_32","DOIUrl":"https://doi.org/10.1007/978-3-319-93387-0_32","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129586698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multi-client Oblivious RAM Secure Against Malicious Servers 多客户端无关RAM安全针对恶意服务器
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_34
Erik-Oliver Blass, Travis Mayberry, G. Noubir
{"title":"Multi-client Oblivious RAM Secure Against Malicious Servers","authors":"Erik-Oliver Blass, Travis Mayberry, G. Noubir","doi":"10.1007/978-3-319-61204-1_34","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_34","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Simple Security Definitions for and Constructions of 0-RTT Key Exchange 0-RTT密钥交换的简单安全定义和构造
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_2
Britta Hale, Tibor Jager, S. Lauer, Jörg Schwenk
{"title":"Simple Security Definitions for and Constructions of 0-RTT Key Exchange","authors":"Britta Hale, Tibor Jager, S. Lauer, Jörg Schwenk","doi":"10.1007/978-3-319-61204-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_2","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128578419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Signature Schemes with Randomized Verification 随机验证签名方案
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_19
Cody R. Freitag, Rishab Goyal, S. Hohenberger, Venkata Koppula, Eysa Lee, T. Okamoto, Jordan Tran, Brent Waters
{"title":"Signature Schemes with Randomized Verification","authors":"Cody R. Freitag, Rishab Goyal, S. Hohenberger, Venkata Koppula, Eysa Lee, T. Okamoto, Jordan Tran, Brent Waters","doi":"10.1007/978-3-319-61204-1_19","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_19","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121508425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure and Efficient Pairing at 256-Bit Security Level 256位安全级别的安全高效配对
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_4
Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, T. Takagi, Tetsutaro Kobayashi
{"title":"Secure and Efficient Pairing at 256-Bit Security Level","authors":"Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, T. Takagi, Tetsutaro Kobayashi","doi":"10.1007/978-3-319-61204-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_4","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132576243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords 文本密码与地图密码多重干扰的初步研究
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_8
W. Meng, Wenjuan Li, Lee Wang Hao, Lijun Jiang, Jianying Zhou
{"title":"A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords","authors":"W. Meng, Wenjuan Li, Lee Wang Hao, Lijun Jiang, Jianying Zhou","doi":"10.1007/978-3-319-61204-1_8","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_8","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128072280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience s - box的权衡:加密特性和侧信道弹性
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_20
C. Carlet, Annelie Heuser, S. Picek
{"title":"Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience","authors":"C. Carlet, Annelie Heuser, S. Picek","doi":"10.1007/978-3-319-61204-1_20","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_20","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115139520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信