首页 > 最新文献

International Conference on Security for Information Technology and Communications最新文献

英文 中文
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers 在标识符上捆绑语言的分散式多权威匿名凭证系统
Pub Date : 2020-11-19 DOI: 10.1007/978-3-030-69255-1_6
Hiroaki Anada
{"title":"Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers","authors":"Hiroaki Anada","doi":"10.1007/978-3-030-69255-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-69255-1_6","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116143518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Five Cards to Encode Each Integer in $mathbb {Z}/6mathbb {Z}$ 使用五张卡片在$mathbb {Z}/6mathbb {Z}$中编码每个整数
Pub Date : 2020-11-05 DOI: 10.1007/978-3-031-17510-7_12
Suthee Ruangwises
{"title":"Using Five Cards to Encode Each Integer in $mathbb {Z}/6mathbb {Z}$","authors":"Suthee Ruangwises","doi":"10.1007/978-3-031-17510-7_12","DOIUrl":"https://doi.org/10.1007/978-3-031-17510-7_12","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"668 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122620319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Activity Detection from Encrypted Remote Desktop Protocol Traffic 从加密的远程桌面协议流量进行活动检测
Pub Date : 2020-08-06 DOI: 10.1007/978-3-031-32636-3_14
Lukasz Lapczyk, D. Skillicorn
{"title":"Activity Detection from Encrypted Remote Desktop Protocol Traffic","authors":"Lukasz Lapczyk, D. Skillicorn","doi":"10.1007/978-3-031-32636-3_14","DOIUrl":"https://doi.org/10.1007/978-3-031-32636-3_14","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128223746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms 后量子密码学在受限平台和硬件加速平台上的实际部署
Pub Date : 2019-11-14 DOI: 10.1007/978-3-030-41025-4_8
L. Malina, Sara Ricci, Petr Dzurenda, D. Smekal, J. Hajny, Tomas Gerlich
{"title":"Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms","authors":"L. Malina, Sara Ricci, Petr Dzurenda, D. Smekal, J. Hajny, Tomas Gerlich","doi":"10.1007/978-3-030-41025-4_8","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_8","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130638381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols 安全确定性自动机评估:完整性和高效的双方协议
Pub Date : 2019-11-14 DOI: 10.1007/978-3-030-41025-4_4
G. D. Crescenzo, B. Coan, J. Kirsch
{"title":"Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols","authors":"G. D. Crescenzo, B. Coan, J. Kirsch","doi":"10.1007/978-3-030-41025-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_4","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130176096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Ups and Downs of Technology in Society 技术在社会中的起起落落
Pub Date : 2019-11-14 DOI: 10.1007/978-3-030-41025-4_2
Natacha Sylvie Laniado
{"title":"The Ups and Downs of Technology in Society","authors":"Natacha Sylvie Laniado","doi":"10.1007/978-3-030-41025-4_2","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_2","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Microcontroller Implementation of BIKE 高效的单片机实现BIKE
Pub Date : 2019-11-14 DOI: 10.1007/978-3-030-41025-4_3
Mario Bischof, Tobias Oder, T. Güneysu
{"title":"Efficient Microcontroller Implementation of BIKE","authors":"Mario Bischof, Tobias Oder, T. Güneysu","doi":"10.1007/978-3-030-41025-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_3","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
White-Box Traitor-Tracing from Tardos Probabilistic Codes 基于塔多斯概率码的白盒叛徒追踪
Pub Date : 2019-11-14 DOI: 10.1007/978-3-030-41025-4_9
Sandra Rasoamiaramanana, Gilles Macario-Rat, M. Minier
{"title":"White-Box Traitor-Tracing from Tardos Probabilistic Codes","authors":"Sandra Rasoamiaramanana, Gilles Macario-Rat, M. Minier","doi":"10.1007/978-3-030-41025-4_9","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_9","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme 基于puf的认证方案中带有故意噪声的深度学习攻击对策
Pub Date : 2019-11-14 DOI: 10.1007/978-3-030-41025-4_6
Risa Yashiro, Y. Hori, T. Katashita, K. Sakiyama
{"title":"A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme","authors":"Risa Yashiro, Y. Hori, T. Katashita, K. Sakiyama","doi":"10.1007/978-3-030-41025-4_6","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_6","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122742735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory 布尔电路的逻辑锁定:来自防篡改存储器的可证明的基于硬件的混淆
Pub Date : 2019-11-14 DOI: 10.1007/978-3-030-41025-4_12
G. D. Crescenzo, A. Sengupta, O. Sinanoglu, Muhammad Yasin
{"title":"Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory","authors":"G. D. Crescenzo, A. Sengupta, O. Sinanoglu, Muhammad Yasin","doi":"10.1007/978-3-030-41025-4_12","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_12","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127245658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International Conference on Security for Information Technology and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1