Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_29
Shiran Pan, W. Zhu, Qiongxiao Wang, Bing Chang
{"title":"Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations","authors":"Shiran Pan, W. Zhu, Qiongxiao Wang, Bing Chang","doi":"10.1007/978-3-030-01701-9_29","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_29","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114587079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_6
A. Tiwari, Fabian Bendun, Christian Hammer
{"title":"A Formal Logic Framework for the Automation of the Right to Be Forgotten","authors":"A. Tiwari, Fabian Bendun, Christian Hammer","doi":"10.1007/978-3-030-01701-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_6","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"38 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_13
J. Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin
{"title":"Neural Network Based Min-entropy Estimation for Random Number Generators","authors":"J. Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin","doi":"10.1007/978-3-030-01704-0_13","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_13","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_5
Mengyi Li, Chi-Hung Chi, Chen Ding, R. Wong, Zhong She
{"title":"A Multi-protocol Authentication Shibboleth Framework and Implementation for Identity Federation","authors":"Mengyi Li, Chi-Hung Chi, Chen Ding, R. Wong, Zhong She","doi":"10.1007/978-3-030-01704-0_5","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_5","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_19
J. Rodriguez, J. Posegga
{"title":"Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution","authors":"J. Rodriguez, J. Posegga","doi":"10.1007/978-3-030-01704-0_19","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_19","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_31
Ang Li, Wei Du, Qinghua Li
{"title":"Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud","authors":"Ang Li, Wei Du, Qinghua Li","doi":"10.1007/978-3-030-01701-9_31","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_31","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_16
Chao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Wei-qing Huang, Bin Lv
{"title":"FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection","authors":"Chao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Wei-qing Huang, Bin Lv","doi":"10.1007/978-3-030-01701-9_16","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_16","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_21
Afsah Anwar, Aminollah Khormali, Daehun Nyang, Aziz Mohaisen
{"title":"Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions","authors":"Afsah Anwar, Aminollah Khormali, Daehun Nyang, Aziz Mohaisen","doi":"10.1007/978-3-030-01701-9_21","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_21","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130278855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_11
E. SayedM.SaghaianN., T. F. Porta, T. Jaeger, Z. B. Celik, P. Mcdaniel
{"title":"Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout","authors":"E. SayedM.SaghaianN., T. F. Porta, T. Jaeger, Z. B. Celik, P. Mcdaniel","doi":"10.1007/978-3-030-01704-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_11","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_3
Suhas Setikere, V. Sachidananda, Y. Elovici
{"title":"Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things","authors":"Suhas Setikere, V. Sachidananda, Y. Elovici","doi":"10.1007/978-3-030-01701-9_3","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122933904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}