首页 > 最新文献

Information Security Practice and Experience最新文献

英文 中文
A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks 基于移动参考节点的无线传感器网络安全周期时钟同步方法
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_30
Jing Xu, Yuqiang Zhang, F. Xu, Lei Zhou, Shuanglin Jiang
{"title":"A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks","authors":"Jing Xu, Yuqiang Zhang, F. Xu, Lei Zhou, Shuanglin Jiang","doi":"10.1007/978-3-319-99807-7_30","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_30","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131834148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE 再论Kannan LWE嵌入攻击中的稀疏化技术
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_27
Yuntao Wang, T. Wunderer
{"title":"Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE","authors":"Yuntao Wang, T. Wunderer","doi":"10.1007/978-3-319-99807-7_27","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_27","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121939464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption 可搜索对称加密中多重哈希的高效活板门生成
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_10
Takato Hirano, Yutaka Kawai, Yoshihiro Koseki
{"title":"Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption","authors":"Takato Hirano, Yutaka Kawai, Yoshihiro Koseki","doi":"10.1007/978-3-319-99807-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_10","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits 从乱码电路中恢复泄漏的选择密文安全功能加密
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_8
Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu
{"title":"Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits","authors":"Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu","doi":"10.1007/978-3-319-99807-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_8","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121676894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compact Ring Signature in the Standard Model for Blockchain 区块链标准模型中的紧凑环签名
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_4
Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen
{"title":"Compact Ring Signature in the Standard Model for Blockchain","authors":"Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen","doi":"10.1007/978-3-319-99807-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_4","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks T_SM:防止单迹攻击的椭圆曲线标量乘法算法
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_25
Bo-Yeon Sim, K. Choi, Dukjae Moon, H. Yoon, Jihoon Cho, Dong‐Guk Han
{"title":"T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks","authors":"Bo-Yeon Sim, K. Choi, Dukjae Moon, H. Yoon, Jihoon Cho, Dong‐Guk Han","doi":"10.1007/978-3-319-99807-7_25","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_25","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123720916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness 对抗匆忙对手的分层秘密共享方案:骗子识别和鲁棒性
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_37
P. Roy, Sabyasachi Dutta, Kirill Morozov, A. Adhikari, Kazuhide Fukushima, S. Kiyomoto, K. Sakurai
{"title":"Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness","authors":"P. Roy, Sabyasachi Dutta, Kirill Morozov, A. Adhikari, Kazuhide Fukushima, S. Kiyomoto, K. Sakurai","doi":"10.1007/978-3-319-99807-7_37","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_37","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130349704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM 分布项向量内积的安全计算及其在支持向量机中的应用
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_34
Sabyasachi Dutta, Nishant Nikam, S. Ruj
{"title":"Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM","authors":"Sabyasachi Dutta, Nishant Nikam, S. Ruj","doi":"10.1007/978-3-319-99807-7_34","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_34","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128898798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Regulating IoT Messages 监管物联网信息
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_29
A. Gabillon, Emmanuel Bruno
{"title":"Regulating IoT Messages","authors":"A. Gabillon, Emmanuel Bruno","doi":"10.1007/978-3-319-99807-7_29","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_29","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125414506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones TMGMap:设计基于触摸移动的智能手机地理密码认证
Pub Date : 2018-09-25 DOI: 10.1007/978-3-319-99807-7_23
W. Meng, Zhe Liu
{"title":"TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones","authors":"W. Meng, Zhe Liu","doi":"10.1007/978-3-319-99807-7_23","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_23","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117073767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Information Security Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1