SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography最新文献

筛选
英文 中文
Trans-IDS: A Transformer-Based Intrusion Detection System Trans-IDS:基于变压器的入侵检测系统
El Mahdi Mercha, El Mostapha Chakir, M. Erradi
{"title":"Trans-IDS: A Transformer-Based Intrusion Detection System","authors":"El Mahdi Mercha, El Mostapha Chakir, M. Erradi","doi":"10.5220/0012085800003555","DOIUrl":"https://doi.org/10.5220/0012085800003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"598 1","pages":"402-409"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76792685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection in Smart Grid Networks Using Power Consumption Data 基于功耗数据的智能电网异常检测
Hasina Rahman, P. Nanda, M. Mohanty, N. Sheikh
{"title":"Anomaly Detection in Smart Grid Networks Using Power Consumption Data","authors":"Hasina Rahman, P. Nanda, M. Mohanty, N. Sheikh","doi":"10.5220/0012137600003555","DOIUrl":"https://doi.org/10.5220/0012137600003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"29 1","pages":"830-837"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79475751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility 基于令牌的符合ssi授予资格的电子投票系统
Dario Castellano, R. Prisco, Pompeo Faruolo
{"title":"Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility","authors":"Dario Castellano, R. Prisco, Pompeo Faruolo","doi":"10.5220/0012121100003555","DOIUrl":"https://doi.org/10.5220/0012121100003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"8 1","pages":"752-757"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78968446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed "Hakoniwa" 国际互认:美国、英国、欧盟和日本信托服务及“Hakoniwa”试验台的描述
Satoshi Kai, T. Kondo, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka
{"title":"International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed \"Hakoniwa\"","authors":"Satoshi Kai, T. Kondo, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka","doi":"10.5220/0012124200003555","DOIUrl":"https://doi.org/10.5220/0012124200003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"93 1","pages":"764-771"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72904300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Winternitz OTS with a Novel Fingerprinting Function 具有新型指纹识别功能的Winternitz OTS改进
Motonari Honda, Y. Kaji
{"title":"Improvement of Winternitz OTS with a Novel Fingerprinting Function","authors":"Motonari Honda, Y. Kaji","doi":"10.5220/0012049100003555","DOIUrl":"https://doi.org/10.5220/0012049100003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"49 1","pages":"303-311"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81255935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Regulating Cyber Incidents: A Review of Recent Reporting Requirements 规范网络事件:近期报告要求的回顾
Angelica Marotta, S. Madnick
{"title":"Regulating Cyber Incidents: A Review of Recent Reporting Requirements","authors":"Angelica Marotta, S. Madnick","doi":"10.5220/0012086000003555","DOIUrl":"https://doi.org/10.5220/0012086000003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"32 1","pages":"410-416"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81271150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OCScraper: Automated Analysis of the Fingerprintability of the iOS API OCScraper:自动分析iOS API的指纹识别能力
Gerald Palfinger
{"title":"OCScraper: Automated Analysis of the Fingerprintability of the iOS API","authors":"Gerald Palfinger","doi":"10.5220/0012089600003555","DOIUrl":"https://doi.org/10.5220/0012089600003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"21 1","pages":"433-441"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83863469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Sovereign Identity (SSI) Attribute-Based Web Authentication SSI (Self-Sovereign Identity)基于属性的Web认证
Biagio Boi, M. Santis, C. Esposito
{"title":"Self-Sovereign Identity (SSI) Attribute-Based Web Authentication","authors":"Biagio Boi, M. Santis, C. Esposito","doi":"10.5220/0012121400003555","DOIUrl":"https://doi.org/10.5220/0012121400003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"21 1","pages":"758-763"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84590974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lessons Learned: Defending Against Property Inference Attacks 经验教训:防御财产推理攻击
Joshua Stock, Jens Wettlaufer, Daniel Demmler, H. Federrath
{"title":"Lessons Learned: Defending Against Property Inference Attacks","authors":"Joshua Stock, Jens Wettlaufer, Daniel Demmler, H. Federrath","doi":"10.5220/0012049200003555","DOIUrl":"https://doi.org/10.5220/0012049200003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"1 1","pages":"312-323"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83440413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Data Replication 区块链数据复制
R. Prisco, Sergiy Shevchenko, Pompeo Faruolo
{"title":"Blockchain Data Replication","authors":"R. Prisco, Sergiy Shevchenko, Pompeo Faruolo","doi":"10.5220/0012121000003555","DOIUrl":"https://doi.org/10.5220/0012121000003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"11 1","pages":"746-751"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82009425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信