SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography最新文献

筛选
英文 中文
On Single-Server Delegation Without Precomputation 无预计算的单服务器委托
Matluba Khodjaeva, G. D. Crescenzo
{"title":"On Single-Server Delegation Without Precomputation","authors":"Matluba Khodjaeva, G. D. Crescenzo","doi":"10.5220/0012140100003555","DOIUrl":"https://doi.org/10.5220/0012140100003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"7 1","pages":"540-547"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81844474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN-HMM Model for Real Time DGA Categorization 实时DGA分类的CNN-HMM模型
Aimen Mahmood, Haider Abbas, Faisal Amjad
{"title":"CNN-HMM Model for Real Time DGA Categorization","authors":"Aimen Mahmood, Haider Abbas, Faisal Amjad","doi":"10.5220/0012136800003555","DOIUrl":"https://doi.org/10.5220/0012136800003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"56 3 1","pages":"822-829"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79556156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware MEMES:基于内存加密的商用硬件内存安全
David Schrammel, Salmin Sultana, Karanvir Grewal, M. LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, S. Mangard
{"title":"MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware","authors":"David Schrammel, Salmin Sultana, Karanvir Grewal, M. LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, S. Mangard","doi":"10.5220/0012050300003555","DOIUrl":"https://doi.org/10.5220/0012050300003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"66 1","pages":"25-36"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83809046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AIS Authentication Using Certificateless Cryptography 使用无证书加密的AIS身份验证
Axel Rousselot, N. Cuppens-Boulahia, Samra Bouakkaz
{"title":"AIS Authentication Using Certificateless Cryptography","authors":"Axel Rousselot, N. Cuppens-Boulahia, Samra Bouakkaz","doi":"10.5220/0012054600003555","DOIUrl":"https://doi.org/10.5220/0012054600003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"15 1","pages":"49-61"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75452584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic Blockchain on Generic Human Behavior 基于一般人类行为的通用区块链
Clémentine Gritti, F. A. Hayek, P. Lafourcade
{"title":"Generic Blockchain on Generic Human Behavior","authors":"Clémentine Gritti, F. A. Hayek, P. Lafourcade","doi":"10.5220/0012091700003555","DOIUrl":"https://doi.org/10.5220/0012091700003555","url":null,"abstract":". Blockchain is a type of distributed ledger. A wide range of consensus algorithms exists to reach consensus in a decentralized manner. However, most of them trade energy consumption for a degree of openness. Blockchains are primarily used for tokens and cryptocurren-cies. Often the process of minting new tokens depends on actionable real world behaviors. A difficulty persists in securely translating said behavior into a decentralized blockchain. We formalize the generic concept of Proof of Behavior (PoB), and use it to create a consensus mechanism for generic permissionless blockchains.","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"48 1","pages":"206-217"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74841729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ZT-NIDS: Zero Trust, Network Intrusion Detection System 零信任,网络入侵检测系统
Abeer Z. Alalmaie, P. Nanda, Xiangjian He
{"title":"ZT-NIDS: Zero Trust, Network Intrusion Detection System","authors":"Abeer Z. Alalmaie, P. Nanda, Xiangjian He","doi":"10.5220/0012080000003555","DOIUrl":"https://doi.org/10.5220/0012080000003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"10 1","pages":"99-110"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73118250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication 新型无人机-地面站及无人机-无人机通信认证方案的安全性研究
M. Benssalah, Karim Drouiche
{"title":"On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication","authors":"M. Benssalah, Karim Drouiche","doi":"10.5220/0012077400003555","DOIUrl":"https://doi.org/10.5220/0012077400003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"52 1","pages":"361-368"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75564448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis 网络物理系统的远程安全评估:为增强诊断调整设计模式
Kazutaka Matsuzaki, K. Sawada, S. Honiden
{"title":"Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis","authors":"Kazutaka Matsuzaki, K. Sawada, S. Honiden","doi":"10.5220/0012132600003555","DOIUrl":"https://doi.org/10.5220/0012132600003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"54 1","pages":"805-812"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73857484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems 平滑旅程:提供从已建立的跨境eID工作流程到eID钱包系统的无缝升级路径
Roland Czerny, Christian Kollmann, Blaž Podgorelec, Bernd Prünster, Thomas Zefferer
{"title":"Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems","authors":"Roland Czerny, Christian Kollmann, Blaž Podgorelec, Bernd Prünster, Thomas Zefferer","doi":"10.5220/0012091900003555","DOIUrl":"https://doi.org/10.5220/0012091900003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"64 1","pages":"460-468"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74043724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defeating MageCart Attacks in a NAISS Way 以NAISS的方式击败MageCart攻击
Cătălin Rus, D. Sarmah, Mohammed El-hajj
{"title":"Defeating MageCart Attacks in a NAISS Way","authors":"Cătălin Rus, D. Sarmah, Mohammed El-hajj","doi":"10.5220/0012079300003555","DOIUrl":"https://doi.org/10.5220/0012079300003555","url":null,"abstract":": MageCart attacks pose a security threat to E-commerce platforms by using e-skimmers to steal payment details. Image steganography is used by attackers to conceal e-skimmers, making detection challenging. Existing solutions have limitations, such as incompatibility or insufficient functionality. This research proposes NAISS, a server-side middlebox solution that leverages digital signatures to filter unauthorized images without requiring client-side modifications. The proof-of-concept implementation demonstrates the efficacy of NAISS, filtering 100% of state of the art stegoimages, while indicating areas for further improvement.","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"10 1","pages":"691-697"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79711378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信