Pub Date : 2017-12-13DOI: 10.1007/978-3-319-72359-4_17
Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee
{"title":"A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties","authors":"Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee","doi":"10.1007/978-3-319-72359-4_17","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_17","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-13DOI: 10.1007/978-3-319-72359-4_10
Bo-Yeon Sim, Dong‐Guk Han
{"title":"Key Bit-Dependent Attack on Protected PKC Using a Single Trace","authors":"Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1007/978-3-319-72359-4_10","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_10","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124670949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-13DOI: 10.1007/978-3-319-72359-4_19
Yanling Li, Junzuo Lai, Chuansheng Wang, Jiang Zhang, Jie Xiong
{"title":"Verifiable Range Query Processing for Cloud Computing","authors":"Yanling Li, Junzuo Lai, Chuansheng Wang, Jiang Zhang, Jie Xiong","doi":"10.1007/978-3-319-72359-4_19","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_19","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128028847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-13DOI: 10.1007/978-3-319-72359-4_34
Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han
{"title":"Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)","authors":"Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han","doi":"10.1007/978-3-319-72359-4_34","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_34","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114647657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-13DOI: 10.1007/978-3-319-72359-4_56
Jun Cai, Jianzhen Luo, Jianliang Ruan, Yan Liu
{"title":"Toward Fuzz Test Based on Protocol Reverse Engineering","authors":"Jun Cai, Jianzhen Luo, Jianliang Ruan, Yan Liu","doi":"10.1007/978-3-319-72359-4_56","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_56","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116460038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-13DOI: 10.1007/978-3-319-72359-4_54
Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang, H. Guesgen
{"title":"A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices","authors":"Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang, H. Guesgen","doi":"10.1007/978-3-319-72359-4_54","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_54","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-13DOI: 10.1007/978-3-319-72359-4_8
Song Luo, Lu Yan, J. Weng, Zheng Yang
{"title":"New Proof for BKP IBE Scheme and Improvement in the MIMC Setting","authors":"Song Luo, Lu Yan, J. Weng, Zheng Yang","doi":"10.1007/978-3-319-72359-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_8","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-13DOI: 10.1007/978-3-319-72359-4_7
Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, K. Liang
{"title":"Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing","authors":"Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, K. Liang","doi":"10.1007/978-3-319-72359-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_7","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131529122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}