International Conference on Applied Cryptography and Network Security最新文献

筛选
英文 中文
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices 无免费充电定理:移动设备上通过USB充电线的隐蔽通道
International Conference on Applied Cryptography and Network Security Pub Date : 2016-09-09 DOI: 10.1007/978-3-319-61204-1_5
Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, M. Conti, R. Poovendran
{"title":"No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices","authors":"Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, M. Conti, R. Poovendran","doi":"10.1007/978-3-319-61204-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_5","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing 基于动态数据流切片的二进制码操作模式辅助识别
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_30
Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque
{"title":"Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing","authors":"Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque","doi":"10.1007/978-3-319-39555-5_30","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_30","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116455910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms 为什么软件DoS很难修复:拒绝访问嵌入式Android平台
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_11
Ryan V. Johnson, Mohamed Elsabagh, A. Stavrou
{"title":"Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms","authors":"Ryan V. Johnson, Mohamed Elsabagh, A. Stavrou","doi":"10.1007/978-3-319-39555-5_11","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_11","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124717306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Verifiable Multi-party Computation with Perfectly Private Audit Trail 具有完全私有审计跟踪的可验证多方计算
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_20
Edouard Cuvelier, Olivier Pereira
{"title":"Verifiable Multi-party Computation with Perfectly Private Audit Trail","authors":"Edouard Cuvelier, Olivier Pereira","doi":"10.1007/978-3-319-39555-5_20","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_20","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hash-Based TPM Signatures for the Quantum World 量子世界中基于哈希的TPM签名
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_5
Megumi Ando, J. Guttman, Alberto R. Papaleo, J. Scire
{"title":"Hash-Based TPM Signatures for the Quantum World","authors":"Megumi Ando, J. Guttman, Alberto R. Papaleo, J. Scire","doi":"10.1007/978-3-319-39555-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_5","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff 嵌入式设备中的记忆雕刻:去芜存锦
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_32
Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, C. Rosenberger
{"title":"Memory Carving in Embedded Devices: Separate the Wheat from the Chaff","authors":"Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, C. Rosenberger","doi":"10.1007/978-3-319-39555-5_32","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_32","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125870057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones TMGuard:一种基于触摸移动的智能手机屏幕解锁模式安全机制
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_34
W. Meng, Wenjuan Li, D. Wong, Jianying Zhou
{"title":"TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones","authors":"W. Meng, Wenjuan Li, D. Wong, Jianying Zhou","doi":"10.1007/978-3-319-39555-5_34","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_34","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Fuzzy Signatures: Relaxing Requirements and a New Construction 模糊签名:放宽要求与新构建
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_6
Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
{"title":"Fuzzy Signatures: Relaxing Requirements and a New Construction","authors":"Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka","doi":"10.1007/978-3-319-39555-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_6","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121189748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation Trinocchio:分布式可验证计算的隐私保护外包
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_19
Berry Schoenmakers, Meilof Veeningen, N. Vreede
{"title":"Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation","authors":"Berry Schoenmakers, Meilof Veeningen, N. Vreede","doi":"10.1007/978-3-319-39555-5_19","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_19","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Lattice-Based Group Signature Scheme with Message-Dependent Opening 基于格的消息依赖开放组签名方案
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_8
Benoît Libert, Fabrice Mouhartem, Khoa Nguyen
{"title":"A Lattice-Based Group Signature Scheme with Message-Dependent Opening","authors":"Benoît Libert, Fabrice Mouhartem, Khoa Nguyen","doi":"10.1007/978-3-319-39555-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_8","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116112380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信