首页 > 最新文献

Foundations and Practice of Security最新文献

英文 中文
Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid 基于cliiseaudroid的移动应用的去中心化动态安全执行
Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_3
T. Hamann, H. Mantel
{"title":"Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid","authors":"T. Hamann, H. Mantel","doi":"10.1007/978-3-030-18419-3_3","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_3","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"4 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116873509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna 乌克兰新哈希函数标准的故障分析:Kupyna
Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_15
O. Duman, A. Youssef
{"title":"Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna","authors":"O. Duman, A. Youssef","doi":"10.1007/978-3-030-18419-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_15","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"46 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114524932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data 从不完整和噪声数据中挖掘基于关系的访问控制策略
Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_18
Thang Bui, S. Stoller, Jiajie Li
{"title":"Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data","authors":"Thang Bui, S. Stoller, Jiajie Li","doi":"10.1007/978-3-030-18419-3_18","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_18","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"14 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Achieving Mobile-Health Privacy Using Attribute-Based Access Control 使用基于属性的访问控制实现移动医疗隐私
Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_20
Vignesh M. Pagadala, I. Ray
{"title":"Achieving Mobile-Health Privacy Using Attribute-Based Access Control","authors":"Vignesh M. Pagadala, I. Ray","doi":"10.1007/978-3-030-18419-3_20","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_20","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Configuring Data Flows in the Internet of Things for Security and Privacy Requirements 配置物联网数据流,满足安全与隐私需求
Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_8
L. Logrippo, Abdelouadoud Stambouli
{"title":"Configuring Data Flows in the Internet of Things for Security and Privacy Requirements","authors":"L. Logrippo, Abdelouadoud Stambouli","doi":"10.1007/978-3-030-18419-3_8","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_8","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper) scada驱动的网络物理系统的缓解技术研究(立场文件)
Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_17
M. Segovia, A. Cavalli, N. Cuppens-Boulahia, Joaquín García
{"title":"A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper)","authors":"M. Segovia, A. Cavalli, N. Cuppens-Boulahia, Joaquín García","doi":"10.1007/978-3-030-18419-3_17","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_17","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134279414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing Internet-of-Things 获得物联网
Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_1
G. Gong
{"title":"Securing Internet-of-Things","authors":"G. Gong","doi":"10.1007/978-3-030-18419-3_1","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122616009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ethereum: State of Knowledge and Research Perspectives 以太坊:知识现状和研究前景
Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-75650-9_14
S. Tikhomirov
{"title":"Ethereum: State of Knowledge and Research Perspectives","authors":"S. Tikhomirov","doi":"10.1007/978-3-319-75650-9_14","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Deception in Information Security: Legal Considerations in the Context of German and European Law 信息安全中的欺骗:德国和欧洲法律背景下的法律考虑
Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-75650-9_17
Daniel Fraunholz, C. Lipps, Marc Zimmermann, S. D. Antón, Johannes Mueller, H. Schotten
{"title":"Deception in Information Security: Legal Considerations in the Context of German and European Law","authors":"Daniel Fraunholz, C. Lipps, Marc Zimmermann, S. D. Antón, Johannes Mueller, H. Schotten","doi":"10.1007/978-3-319-75650-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_17","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Analysis of the FIDO 1.x Protocol FIDO的形式分析x协议
Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-75650-9_5
Olivier Pereira, F. Rochet, Cyrille Wiedling
{"title":"Formal Analysis of the FIDO 1.x Protocol","authors":"Olivier Pereira, F. Rochet, Cyrille Wiedling","doi":"10.1007/978-3-319-75650-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_5","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Foundations and Practice of Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1