![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Result Integrity Verification of Outsourced Frequent Itemset Mining
The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, ...
-
Chapter and Conference Paper
Quantitative Security Risk Assessment of Android Permissions and Applications
The booming of the Android platform in recent years has attracted the attention of malware developers. However, the permissions-based model used in Android system to prevent the spread of malware, has shown to...
-
Chapter and Conference Paper
TerraCheck: Verification of Dedicated Cloud Storage
When hardware resources are shared between mutually distrustful tenants in the cloud, it may cause information leakage and bring difficulties to regulatory control. To address these concerns, cloud providers a...
-
Chapter and Conference Paper
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...
-
Chapter and Conference Paper
Scalable Telemetry Classification for Automated Malware Detection
Industry reports and blogs have estimated the amount of malware based on known malicious files. This paper extends this analysis to the amount of unknown malware. The study is based on 26.7 million files referenc...
-
Chapter and Conference Paper
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making
The availability and reliability of large critical infrastructures depend on decisions made by hundreds or thousands of interdependent entities and, by extension, on the information that the entities exchange ...
-
Chapter and Conference Paper
The Delicate Issues of Addition with Respect to XOR Differences
In this paper we analyze the previous attacks on the block cipher SHACAL-1 and show that all the differential-based attacks fail due to mistreatment of XOR differences through addition. We show that the previo...
-
Chapter and Conference Paper
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
The one-way function tree (OFT) scheme proposed by Balenson et al. is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. Following Horng’s claim that the ...
-
Chapter and Conference Paper
A More Natural Way to Construct Identity-Based Identification Schemes
Constructing identification schemes is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify itself to a pub...