Pub Date : 2019-11-26DOI: 10.1007/978-3-030-34339-2_11
Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, I. Borne
{"title":"Designing a Code Vulnerability Meta-scanner","authors":"Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, I. Borne","doi":"10.1007/978-3-030-34339-2_11","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_11","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121799435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.1007/978-3-030-34339-2_23
C. S. Sin, Huey Voon Chen
{"title":"Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem","authors":"C. S. Sin, Huey Voon Chen","doi":"10.1007/978-3-030-34339-2_23","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_23","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"936 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123294185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.1007/978-3-030-34339-2_19
Mirosław Kutyłowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala
{"title":"GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures","authors":"Mirosław Kutyłowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala","doi":"10.1007/978-3-030-34339-2_19","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_19","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129185007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.1007/978-3-030-34339-2_2
J. Yoo, Jeong-Hwan Hwang, B. Song, J. Yoon
{"title":"A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme","authors":"J. Yoo, Jeong-Hwan Hwang, B. Song, J. Yoon","doi":"10.1007/978-3-030-34339-2_2","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_2","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.1007/978-3-030-34339-2_17
L. Krzywiecki, Marta Slowik, Michal Szala
{"title":"Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios","authors":"L. Krzywiecki, Marta Slowik, Michal Szala","doi":"10.1007/978-3-030-34339-2_17","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_17","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.1007/978-3-030-34339-2_24
P. Nkomo, M. Coetzee
{"title":"Development Activities, Tools and Techniques of Secure Microservices Compositions","authors":"P. Nkomo, M. Coetzee","doi":"10.1007/978-3-030-34339-2_24","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_24","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115533580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.1007/978-3-030-34339-2_22
Arnaud Sipasseuth, T. Plantard, W. Susilo
{"title":"Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications","authors":"Arnaud Sipasseuth, T. Plantard, W. Susilo","doi":"10.1007/978-3-030-34339-2_22","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_22","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116351052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.1007/978-3-030-34339-2_3
W. Lee, S. Akleylek, W. Yap, B. Goi
{"title":"Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme","authors":"W. Lee, S. Akleylek, W. Yap, B. Goi","doi":"10.1007/978-3-030-34339-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_3","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}