首页 > 最新文献

ACM SIGSOFT Symposium on Software Reusability最新文献

英文 中文
Non-repudiation Services for the MMS Protocol of IEC 61850 IEC 61850的MMS协议的不可否认服务
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_4
C. Ruland, J. Sassmannshausen
{"title":"Non-repudiation Services for the MMS Protocol of IEC 61850","authors":"C. Ruland, J. Sassmannshausen","doi":"10.1007/978-3-319-27152-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_4","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124950188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures 使用密码和基于身份的签名的鲁棒认证密钥交换
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_3
J. Hwang, Seung-Hyun Kim, D. Choi, Seunghun Jin, Boyeon Song
{"title":"Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures","authors":"J. Hwang, Seung-Hyun Kim, D. Choi, Seunghun Jin, Boyeon Song","doi":"10.1007/978-3-319-27152-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_3","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128834988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks SM2签名方案抗广义密钥替换攻击的安全性
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_7
Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen
{"title":"Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks","authors":"Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen","doi":"10.1007/978-3-319-27152-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_7","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132080643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks 实用的信任框架:通过分析业务场景和相关风险重新包装的保证级别
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_11
Masatoshi Hokino, Y. Fujiki, Sakura Onda, Takeaki Kaneko, N. Sakimura, Hiroyuki Sato
{"title":"A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks","authors":"Masatoshi Hokino, Y. Fujiki, Sakura Onda, Takeaki Kaneko, N. Sakimura, Hiroyuki Sato","doi":"10.1007/978-3-319-27152-1_11","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_11","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Authenticated Key Exchange over Bitcoin 通过比特币进行认证密钥交换
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_1
Patrick McCorry, S. F. Shahandashti, D. Clarke, F. Hao
{"title":"Authenticated Key Exchange over Bitcoin","authors":"Patrick McCorry, S. F. Shahandashti, D. Clarke, F. Hao","doi":"10.1007/978-3-319-27152-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_1","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122386413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment TTP (Tap-Tap and Pay):防止NFC支付中的黑手党攻击
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_2
M. Mehrnezhad, F. Hao, S. F. Shahandashti
{"title":"Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment","authors":"M. Mehrnezhad, F. Hao, S. F. Shahandashti","doi":"10.1007/978-3-319-27152-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_2","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"423 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131707535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Generating Unlinkable IPv6 Addresses 生成不可链接的IPv6地址
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_10
M. Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, C. Mitchell, P. Yau
{"title":"Generating Unlinkable IPv6 Addresses","authors":"M. Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, C. Mitchell, P. Yau","doi":"10.1007/978-3-319-27152-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_10","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123644347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Side Channel Cryptanalysis of Streebog Streebog的侧信道密码分析
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_8
G. Sekar
{"title":"Side Channel Cryptanalysis of Streebog","authors":"G. Sekar","doi":"10.1007/978-3-319-27152-1_8","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_8","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121198042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
First Results of a Formal Analysis of the Network Time Security Specification 网络时间安全规范形式化分析的第一个结果
Pub Date : 2015-12-15 DOI: 10.1007/978-3-319-27152-1_12
K. Teichel, D. Sibold, Stefan Milius
{"title":"First Results of a Formal Analysis of the Network Time Security Specification","authors":"K. Teichel, D. Sibold, Stefan Milius","doi":"10.1007/978-3-319-27152-1_12","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_12","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Formal Support for Standardizing Protocols with State 对带有状态的标准化协议的正式支持
Pub Date : 2015-09-24 DOI: 10.1007/978-3-319-27152-1_13
J. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe
{"title":"Formal Support for Standardizing Protocols with State","authors":"J. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe","doi":"10.1007/978-3-319-27152-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_13","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
ACM SIGSOFT Symposium on Software Reusability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1