ISPEC C

29 papers

YearTitle / Authors
2019A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme.
Joon Soo Yoo, Jeong-Hwan Hwang, Baek Kyung Song, Ji Won Yoon
2019A Novel and Comprehensive Evaluation Methodology for SIEM.
Mahdieh Safarzadeh, Hossein Gharaee, Amir Hossein Panahi
2019A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.
Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone
2019Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme.
Wai-Kong Lee, Sedat Akleylek, Wun-She Yap, Bok-Min Goi
2019CATCHA: When Cats Track Your Movements Online.
Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat
2019Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K.
Andrew Rae, Asma Patel
2019Designing a Code Vulnerability Meta-scanner.
Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, Isabelle Borne
2019Development Activities, Tools and Techniques of Secure Microservices Compositions.
Peter T. Nkomo, Marijke Coetzee
2019Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.
Wenjuan Li, Weizhi Meng, Lam For Kwok
2019Evaluation of Software PUF Based on Gyroscope.
Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki
2019GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures.
Miroslaw Kutylowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala
2019Generating Phishing Emails Using Graph Database.
Nasim Maleki, Ali A. Ghorbani
2019Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem.
Chang Seng Sin, Huey Voon Chen
2019Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios.
Lukasz Krzywiecki, Marta Slowik, Michal Szala
2019Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.
Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, Reza Azarderakhsh
2019Improving Signature Schemes with Tight Security Reductions.
Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin
2019Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings
Swee-Huay Heng, Javier López
2019JSLess: A Tale of a Fileless Javascript Memory-Resident Malware.
Sherif Saad, Farhan Mahmood, William Briguglio, Haytham Elmiligi
2019KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.
Hiroki Kuzuno, Toshihiro Yamauchi
2019Peel the Onion: Recognition of Android Apps Behind the Tor Network.
Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli, Leonardo Querzoni
2019Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.
Sha Ma, Qiong Huang
2019Privacy Preserving Approach in Dynamic Social Network Data Publishing.
Kamalkumar R. Macwan, Sankita J. Patel
2019Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE.
Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You
2019Recovering Internal States of Grain-v1.
Deepak Kumar Dalai, Santu Pal
2019Secure Best Arm Identification in Multi-armed Bandits.
Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare
2019The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm.
Chris Pelchen, David Jaeger, Feng Cheng, Christoph Meinel
2019Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications.
Arnaud Sipasseuth, Thomas Plantard, Willy Susilo
2019Using IFTTT to Express and Enforce UCON Obligations.
Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
2019White-Box Implementation of the KMAC Message Authentication Code.
Jiqiang Lu, Zhigang Zhao, Huaqun Guo