Pub Date : 2018-09-25DOI: 10.1007/978-3-319-99807-7_30
Jing Xu, Yuqiang Zhang, F. Xu, Lei Zhou, Shuanglin Jiang
{"title":"A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks","authors":"Jing Xu, Yuqiang Zhang, F. Xu, Lei Zhou, Shuanglin Jiang","doi":"10.1007/978-3-319-99807-7_30","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_30","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131834148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-25DOI: 10.1007/978-3-319-99807-7_27
Yuntao Wang, T. Wunderer
{"title":"Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE","authors":"Yuntao Wang, T. Wunderer","doi":"10.1007/978-3-319-99807-7_27","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_27","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121939464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-25DOI: 10.1007/978-3-319-99807-7_8
Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu
{"title":"Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits","authors":"Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu","doi":"10.1007/978-3-319-99807-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_8","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121676894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-25DOI: 10.1007/978-3-319-99807-7_4
Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen
{"title":"Compact Ring Signature in the Standard Model for Blockchain","authors":"Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen","doi":"10.1007/978-3-319-99807-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_4","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-25DOI: 10.1007/978-3-319-99807-7_37
P. Roy, Sabyasachi Dutta, Kirill Morozov, A. Adhikari, Kazuhide Fukushima, S. Kiyomoto, K. Sakurai
{"title":"Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness","authors":"P. Roy, Sabyasachi Dutta, Kirill Morozov, A. Adhikari, Kazuhide Fukushima, S. Kiyomoto, K. Sakurai","doi":"10.1007/978-3-319-99807-7_37","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_37","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130349704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-25DOI: 10.1007/978-3-319-99807-7_34
Sabyasachi Dutta, Nishant Nikam, S. Ruj
{"title":"Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM","authors":"Sabyasachi Dutta, Nishant Nikam, S. Ruj","doi":"10.1007/978-3-319-99807-7_34","DOIUrl":"https://doi.org/10.1007/978-3-319-99807-7_34","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128898798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}