Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_4
C. Ruland, J. Sassmannshausen
{"title":"Non-repudiation Services for the MMS Protocol of IEC 61850","authors":"C. Ruland, J. Sassmannshausen","doi":"10.1007/978-3-319-27152-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_4","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124950188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_3
J. Hwang, Seung-Hyun Kim, D. Choi, Seunghun Jin, Boyeon Song
{"title":"Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures","authors":"J. Hwang, Seung-Hyun Kim, D. Choi, Seunghun Jin, Boyeon Song","doi":"10.1007/978-3-319-27152-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_3","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128834988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_7
Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen
{"title":"Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks","authors":"Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen","doi":"10.1007/978-3-319-27152-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_7","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132080643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_11
Masatoshi Hokino, Y. Fujiki, Sakura Onda, Takeaki Kaneko, N. Sakimura, Hiroyuki Sato
{"title":"A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks","authors":"Masatoshi Hokino, Y. Fujiki, Sakura Onda, Takeaki Kaneko, N. Sakimura, Hiroyuki Sato","doi":"10.1007/978-3-319-27152-1_11","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_11","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_1
Patrick McCorry, S. F. Shahandashti, D. Clarke, F. Hao
{"title":"Authenticated Key Exchange over Bitcoin","authors":"Patrick McCorry, S. F. Shahandashti, D. Clarke, F. Hao","doi":"10.1007/978-3-319-27152-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_1","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122386413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_2
M. Mehrnezhad, F. Hao, S. F. Shahandashti
{"title":"Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment","authors":"M. Mehrnezhad, F. Hao, S. F. Shahandashti","doi":"10.1007/978-3-319-27152-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_2","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"423 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131707535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_10
M. Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, C. Mitchell, P. Yau
{"title":"Generating Unlinkable IPv6 Addresses","authors":"M. Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, C. Mitchell, P. Yau","doi":"10.1007/978-3-319-27152-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_10","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123644347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_12
K. Teichel, D. Sibold, Stefan Milius
{"title":"First Results of a Formal Analysis of the Network Time Security Specification","authors":"K. Teichel, D. Sibold, Stefan Milius","doi":"10.1007/978-3-319-27152-1_12","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_12","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-24DOI: 10.1007/978-3-319-27152-1_13
J. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe
{"title":"Formal Support for Standardizing Protocols with State","authors":"J. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe","doi":"10.1007/978-3-319-27152-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_13","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}