| 2019 | A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme. Joon Soo Yoo, Jeong-Hwan Hwang, Baek Kyung Song, Ji Won Yoon |
| 2019 | A Novel and Comprehensive Evaluation Methodology for SIEM. Mahdieh Safarzadeh, Hossein Gharaee, Amir Hossein Panahi |
| 2019 | A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation. Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone |
| 2019 | Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme. Wai-Kong Lee, Sedat Akleylek, Wun-She Yap, Bok-Min Goi |
| 2019 | CATCHA: When Cats Track Your Movements Online. Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat |
| 2019 | Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K. Andrew Rae, Asma Patel |
| 2019 | Designing a Code Vulnerability Meta-scanner. Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, Isabelle Borne |
| 2019 | Development Activities, Tools and Techniques of Secure Microservices Compositions. Peter T. Nkomo, Marijke Coetzee |
| 2019 | Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. Wenjuan Li, Weizhi Meng, Lam For Kwok |
| 2019 | Evaluation of Software PUF Based on Gyroscope. Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki |
| 2019 | GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures. Miroslaw Kutylowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala |
| 2019 | Generating Phishing Emails Using Graph Database. Nasim Maleki, Ali A. Ghorbani |
| 2019 | Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem. Chang Seng Sin, Huey Voon Chen |
| 2019 | Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios. Lukasz Krzywiecki, Marta Slowik, Michal Szala |
| 2019 | Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings. Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, Reza Azarderakhsh |
| 2019 | Improving Signature Schemes with Tight Security Reductions. Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin |
| 2019 | Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings Swee-Huay Heng, Javier López |
| 2019 | JSLess: A Tale of a Fileless Javascript Memory-Resident Malware. Sherif Saad, Farhan Mahmood, William Briguglio, Haytham Elmiligi |
| 2019 | KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism. Hiroki Kuzuno, Toshihiro Yamauchi |
| 2019 | Peel the Onion: Recognition of Android Apps Behind the Tor Network. Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli, Leonardo Querzoni |
| 2019 | Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model. Sha Ma, Qiong Huang |
| 2019 | Privacy Preserving Approach in Dynamic Social Network Data Publishing. Kamalkumar R. Macwan, Sankita J. Patel |
| 2019 | Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE. Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You |
| 2019 | Recovering Internal States of Grain-v1. Deepak Kumar Dalai, Santu Pal |
| 2019 | Secure Best Arm Identification in Multi-armed Bandits. Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare |
| 2019 | The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm. Chris Pelchen, David Jaeger, Feng Cheng, Christoph Meinel |
| 2019 | Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications. Arnaud Sipasseuth, Thomas Plantard, Willy Susilo |
| 2019 | Using IFTTT to Express and Enforce UCON Obligations. Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino |
| 2019 | White-Box Implementation of the KMAC Message Authentication Code. Jiqiang Lu, Zhigang Zhao, Huaqun Guo |