首页 > 最新文献

Information Security Practice and Experience最新文献

英文 中文
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism 用秘密检查机制识别内存损坏的内核内存观察器
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_5
Hiroki Kuzuno, Toshihiro Yamauchi
{"title":"KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism","authors":"Hiroki Kuzuno, Toshihiro Yamauchi","doi":"10.1007/978-3-030-34339-2_5","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_5","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125781535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model 标准模型中具有Unlink-CCA安全性的明文可校验加密
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_1
Sha Ma, Qiong Huang
{"title":"Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model","authors":"Sha Ma, Qiong Huang","doi":"10.1007/978-3-030-34339-2_1","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_1","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117264065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Best Arm Identification in Multi-armed Bandits 确保多武装匪徒的最佳武器识别
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_9
Radu Ciucanu, P. Lafourcade, Marius Lombard-Platet, Marta Soare
{"title":"Secure Best Arm Identification in Multi-armed Bandits","authors":"Radu Ciucanu, P. Lafourcade, Marius Lombard-Platet, Marta Soare","doi":"10.1007/978-3-030-34339-2_9","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_9","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133715216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K 为英国中小企业制定新的综合网络安全评级计划
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_20
A. Rae, Asma Patel
{"title":"Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K","authors":"A. Rae, Asma Patel","doi":"10.1007/978-3-030-34339-2_20","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_20","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation Slitherlink的物理ZKP:如何进行物理拓扑保持计算
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_8
P. Lafourcade, Daiki Miyahara, T. Mizuki, Tatsuya Sasaki, H. Sone
{"title":"A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation","authors":"P. Lafourcade, Daiki Miyahara, T. Mizuki, Tatsuya Sasaki, H. Sone","doi":"10.1007/978-3-030-34339-2_8","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_8","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129006094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
White-Box Implementation of the KMAC Message Authentication Code KMAC消息验证码的白盒实现
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_14
Jiqiang Lu, Zhigang Zhao, Huaqun Guo
{"title":"White-Box Implementation of the KMAC Message Authentication Code","authors":"Jiqiang Lu, Zhigang Zhao, Huaqun Guo","doi":"10.1007/978-3-030-34339-2_14","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_14","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130083146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Generic Framework for Accountable Optimistic Fair Exchange Protocol 可问责乐观公平交易协议的通用框架
Pub Date : 2019-02-22 DOI: 10.1007/978-3-319-99807-7_18
Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan
{"title":"A Generic Framework for Accountable Optimistic Fair Exchange Protocol","authors":"Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan","doi":"10.1007/978-3-319-99807-7_18","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_18","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Peel the onion: Recognition of Android apps behind the Tor Network 剥开洋葱:识别Tor网络背后的Android应用程序
Pub Date : 2019-01-14 DOI: 10.1007/978-3-030-34339-2_6
Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli, Leonardo Querzoni
{"title":"Peel the onion: Recognition of Android apps behind the Tor Network","authors":"Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli, Leonardo Querzoni","doi":"10.1007/978-3-030-34339-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_6","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"15 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132870145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices 一种高效安全的车载设备固件更新/回滚方法
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_28
Y. Komano, Z. Xia, Takeshi Kawabata, Hideo Shimizu
{"title":"Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices","authors":"Y. Komano, Z. Xia, Takeshi Kawabata, Hideo Shimizu","doi":"10.1007/978-3-319-99807-7_28","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_28","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120998666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSH: Deniable Secret Handshake Framework DSH:可否认秘密握手框架
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_21
Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu
{"title":"DSH: Deniable Secret Handshake Framework","authors":"Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu","doi":"10.1007/978-3-319-99807-7_21","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_21","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127536960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Information Security Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1