SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography最新文献

筛选
英文 中文
ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract ERC20:基于底层智能合约的线性性和抗干扰性的正确性
R. Shyamasundar
{"title":"ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract","authors":"R. Shyamasundar","doi":"10.5220/0012145800003555","DOIUrl":"https://doi.org/10.5220/0012145800003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"104 1","pages":"557-566"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81663471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys 基于fhe的轻量级协议,实现不同密钥下加密数据结果的一致性
Marina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga
{"title":"Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys","authors":"Marina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga","doi":"10.5220/0012085200003555","DOIUrl":"https://doi.org/10.5220/0012085200003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"58 3 1","pages":"704-709"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91292494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware MEMES:基于内存加密的商用硬件内存安全
David Schrammel, Salmin Sultana, Karanvir Grewal, M. LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, S. Mangard
{"title":"MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware","authors":"David Schrammel, Salmin Sultana, Karanvir Grewal, M. LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, S. Mangard","doi":"10.5220/0012050300003555","DOIUrl":"https://doi.org/10.5220/0012050300003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"66 1","pages":"25-36"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83809046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Single-Server Delegation Without Precomputation 无预计算的单服务器委托
Matluba Khodjaeva, G. D. Crescenzo
{"title":"On Single-Server Delegation Without Precomputation","authors":"Matluba Khodjaeva, G. D. Crescenzo","doi":"10.5220/0012140100003555","DOIUrl":"https://doi.org/10.5220/0012140100003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"7 1","pages":"540-547"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81844474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OCScraper: Automated Analysis of the Fingerprintability of the iOS API OCScraper:自动分析iOS API的指纹识别能力
Gerald Palfinger
{"title":"OCScraper: Automated Analysis of the Fingerprintability of the iOS API","authors":"Gerald Palfinger","doi":"10.5220/0012089600003555","DOIUrl":"https://doi.org/10.5220/0012089600003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"21 1","pages":"433-441"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83863469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AIS Authentication Using Certificateless Cryptography 使用无证书加密的AIS身份验证
Axel Rousselot, N. Cuppens-Boulahia, Samra Bouakkaz
{"title":"AIS Authentication Using Certificateless Cryptography","authors":"Axel Rousselot, N. Cuppens-Boulahia, Samra Bouakkaz","doi":"10.5220/0012054600003555","DOIUrl":"https://doi.org/10.5220/0012054600003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"15 1","pages":"49-61"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75452584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Winternitz OTS with a Novel Fingerprinting Function 具有新型指纹识别功能的Winternitz OTS改进
Motonari Honda, Y. Kaji
{"title":"Improvement of Winternitz OTS with a Novel Fingerprinting Function","authors":"Motonari Honda, Y. Kaji","doi":"10.5220/0012049100003555","DOIUrl":"https://doi.org/10.5220/0012049100003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"49 1","pages":"303-311"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81255935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Data Replication 区块链数据复制
R. Prisco, Sergiy Shevchenko, Pompeo Faruolo
{"title":"Blockchain Data Replication","authors":"R. Prisco, Sergiy Shevchenko, Pompeo Faruolo","doi":"10.5220/0012121000003555","DOIUrl":"https://doi.org/10.5220/0012121000003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"11 1","pages":"746-751"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82009425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lessons Learned: Defending Against Property Inference Attacks 经验教训:防御财产推理攻击
Joshua Stock, Jens Wettlaufer, Daniel Demmler, H. Federrath
{"title":"Lessons Learned: Defending Against Property Inference Attacks","authors":"Joshua Stock, Jens Wettlaufer, Daniel Demmler, H. Federrath","doi":"10.5220/0012049200003555","DOIUrl":"https://doi.org/10.5220/0012049200003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"1 1","pages":"312-323"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83440413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN-HMM Model for Real Time DGA Categorization 实时DGA分类的CNN-HMM模型
Aimen Mahmood, Haider Abbas, Faisal Amjad
{"title":"CNN-HMM Model for Real Time DGA Categorization","authors":"Aimen Mahmood, Haider Abbas, Faisal Amjad","doi":"10.5220/0012136800003555","DOIUrl":"https://doi.org/10.5220/0012136800003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"56 3 1","pages":"822-829"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79556156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信