Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_18
Edona Fasllija, Hasan Ferit Eniser, Bernd Prünster
{"title":"Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs","authors":"Edona Fasllija, Hasan Ferit Eniser, Bernd Prünster","doi":"10.1007/978-3-030-37231-6_18","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_18","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_6
Keke Hu, Xiaohui Zhang, Yongming Wang
{"title":"Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay","authors":"Keke Hu, Xiaohui Zhang, Yongming Wang","doi":"10.1007/978-3-030-37231-6_6","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_6","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122922983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_3
Raquel Alvarez, J. Levenson, Ryan Sheatsley, P. Mcdaniel
{"title":"Application Transiency: Towards a Fair Trade of Personal Information for Application Services","authors":"Raquel Alvarez, J. Levenson, Ryan Sheatsley, P. Mcdaniel","doi":"10.1007/978-3-030-37231-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_8
Sharif Ullah, S. Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan
{"title":"Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System","authors":"Sharif Ullah, S. Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan","doi":"10.1007/978-3-030-37231-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_8","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_24
Meng Li, Liehuang Zhu, Xiaodong Lin
{"title":"CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing","authors":"Meng Li, Liehuang Zhu, Xiaodong Lin","doi":"10.1007/978-3-030-37231-6_24","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_24","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_13
Jiahao Ding, S. Errapotu, Haijun Zhang, Yanmin Gong, M. Pan, Zhu Han
{"title":"Stochastic ADMM Based Distributed Machine Learning with Differential Privacy","authors":"Jiahao Ding, S. Errapotu, Haijun Zhang, Yanmin Gong, M. Pan, Zhu Han","doi":"10.1007/978-3-030-37228-6_13","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_13","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121211807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_21
Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, K. Kwak, Jason H. Li
{"title":"Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts","authors":"Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, K. Kwak, Jason H. Li","doi":"10.1007/978-3-030-37228-6_21","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_21","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131047779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_20
Kris Oosthoek, C. Doerr
{"title":"SoK: ATT&CK Techniques and Trends in Windows Malware","authors":"Kris Oosthoek, C. Doerr","doi":"10.1007/978-3-030-37228-6_20","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_20","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs","authors":"Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu","doi":"10.1007/978-3-030-37228-6_25","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_25","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_12
Ralph Palutke, Andreas Neubaum, J. Götzfried
{"title":"SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization","authors":"Ralph Palutke, Andreas Neubaum, J. Götzfried","doi":"10.1007/978-3-030-37231-6_12","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_12","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131538609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}