ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)最新文献

筛选
英文 中文
Representing LLVM-IR in a Code Property Graph 在代码属性图中表示LLVM-IR
Alexander Kuechler, Christian Banse
{"title":"Representing LLVM-IR in a Code Property Graph","authors":"Alexander Kuechler, Christian Banse","doi":"10.1007/978-3-031-22390-7_21","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_21","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85934438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks 大规模点对点网络中的聚类联邦学习
Qian Chen, Zilong Wang, Yilin Zhou, Jiawei Chen, Danyang Xiao, Xiaodong Lin
{"title":"CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks","authors":"Qian Chen, Zilong Wang, Yilin Zhou, Jiawei Chen, Danyang Xiao, Xiaodong Lin","doi":"10.1007/978-3-031-22390-7_27","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_27","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79348036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control OblivSend:安全的、短暂的文件共享服务,具有遗忘过期控制
Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal
{"title":"OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control","authors":"Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal","doi":"10.1007/978-3-031-22390-7_17","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_17","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74063599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Upside Down: Exploring the Ecosystem of Dark Web Data Markets 颠倒:探索暗网数据市场的生态系统
Bogdan Covrig, Enrique Barrueco Mikelarena, C. Rosca, Catalina Goanta, Gerasimos Spanakis, Apostolis Zarras
{"title":"Upside Down: Exploring the Ecosystem of Dark Web Data Markets","authors":"Bogdan Covrig, Enrique Barrueco Mikelarena, C. Rosca, Catalina Goanta, Gerasimos Spanakis, Apostolis Zarras","doi":"10.1007/978-3-031-06975-8_28","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_28","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74378702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy 一盏灯,一款应用:解决导致用户隐私泄露的常见误解
Efi Siapiti, I. Dionysiou, K. H. Gjermundrød
{"title":"One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy","authors":"Efi Siapiti, I. Dionysiou, K. H. Gjermundrød","doi":"10.1007/978-3-031-06975-8_23","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_23","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74391014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating Simulated Quantum Annealing with GPU and Tensor Cores 用GPU和张量核加速模拟量子退火
Yi-Hua Chung, Cheng-Jhih Shih, Shih-Hao Hung
{"title":"Accelerating Simulated Quantum Annealing with GPU and Tensor Cores","authors":"Yi-Hua Chung, Cheng-Jhih Shih, Shih-Hao Hung","doi":"10.1007/978-3-031-07312-0_9","DOIUrl":"https://doi.org/10.1007/978-3-031-07312-0_9","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76114651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Witness Encryption from Smooth Projective Hashing System 光滑投影哈希系统的见证加密
Yuzhu Wang, Mingwu Zhang
{"title":"Witness Encryption from Smooth Projective Hashing System","authors":"Yuzhu Wang, Mingwu Zhang","doi":"10.1007/978-3-031-22390-7_4","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_4","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80976790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Motivating Case Study on Code Variant Selection by Reinforcement Learning 基于强化学习的代码变体选择激励案例研究
Oliver Hacker, Matthias Korch, Johannes Seiferth
{"title":"A Motivating Case Study on Code Variant Selection by Reinforcement Learning","authors":"Oliver Hacker, Matthias Korch, Johannes Seiferth","doi":"10.1007/978-3-031-07312-0_15","DOIUrl":"https://doi.org/10.1007/978-3-031-07312-0_15","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78590628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries EarlyCrow:使用上下文摘要检测APT恶意软件对HTTP的命令和控制
Almuthanna Alageel, S. Maffeis
{"title":"EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries","authors":"Almuthanna Alageel, S. Maffeis","doi":"10.1007/978-3-031-22390-7_18","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_18","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78492250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Application of Hanging-Node Constraints for Matrix-Free High-Order FEM Computations on CPU and GPU 悬节点约束在CPU和GPU上无矩阵高阶有限元计算中的高效应用
Peter Munch, Karl Ljungkvist, M. Kronbichler
{"title":"Efficient Application of Hanging-Node Constraints for Matrix-Free High-Order FEM Computations on CPU and GPU","authors":"Peter Munch, Karl Ljungkvist, M. Kronbichler","doi":"10.1007/978-3-031-07312-0_7","DOIUrl":"https://doi.org/10.1007/978-3-031-07312-0_7","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78669234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信