| 2023 | A New Gadget Decomposition Algorithm with Less Noise Growth in HE Schemes. Chao Liu, Bozhong Liu |
| 2023 | A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability. Yuchen Yin, Qingqing Gan, Cong Zuo, Ning Liu, Changji Wang, Yuning Jiang |
| 2023 | A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS). Hannes Salin, Lukasz Krzywiecki |
| 2023 | BAHS: A Blockchain-Aided Hash-Based Signature Scheme. Yalan Wang, Liqun Chen, Long Meng, Yangguang Tian |
| 2023 | CVAR-FL IoV Intrusion Detection Framework. Jia Zhao, Xinyu Rao, Jiqiang Liu, Yue Guo, Bokai Yang |
| 2023 | Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities. Sohto Chiku, Keisuke Hara, Junji Shikata |
| 2023 | Cross-Border Data Security from the Perspective of Risk Assessment. Na Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang |
| 2023 | Cryptanalysis of Human Identification Protocol with Human-Computable Passwords. Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj |
| 2023 | DIDO: Data Provenance from Restricted TLS 1.3 Websites. Kwan Yin Chan, Handong Cui, Tsz Hon Yuen |
| 2023 | Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G. Rabeya Basri, Gour C. Karmakar, Joarder Kamruzzaman, S. H. Shah Newaz, Linh Nguyen, Muhammad Usman |
| 2023 | FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations. Tran Duc Luong, Vuong Minh Tien, Phan The Duy, Van-Hau Pham |
| 2023 | Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings Weizhi Meng, Zheng Yan, Vincenzo Piuri |
| 2023 | IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures. Yohei Watanabe, Naoto Yanai, Junji Shikata |
| 2023 | Isogeny-Based Multi-signature Scheme. Mathieu de Goyon, Atsuko Miyaji |
| 2023 | Lever: Making Intensive Validation Practical on Blockchain. Mingming Wang, Qianhong Wu |
| 2023 | LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity. Philipp Jakubeit, Andreas Peter, Maarten van Steen |
| 2023 | MalXCap: A Method for Malware Capability Extraction. Bikash Saha, Nanda Rani, Sandeep Kumar Shukla |
| 2023 | Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations. Tomoya Morooka, Yoshifumi Manabe, Kazumasa Shinagawa |
| 2023 | Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning. Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su |
| 2023 | Mitigating Sybil Attacks in Federated Learning. Ahmed E. Samy, Sarunas Girdzijauskas |
| 2023 | Multimodal Software Defect Severity Prediction Based on Sentiment Probability. Ying Li, Yuhao Lin, Yongchao Zhong, Qiuling Yue, Jinglu Hu, Wenjie Wang, Huiyang Shi, Yuqing Zhang |
| 2023 | Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy. Sebastian Simon, Cezara Petrui, Carlos Pinzón, Catuscia Palamidessi |
| 2023 | Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example. Thomas Prantl, Simon Engel, Lukas Horn, Dennis Kaiser, Lukas Iffländer, André Bauer, Christian Krupitzer, Samuel Kounev |
| 2023 | Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan |
| 2023 | QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing. Mahdieh Safarzadehvahed, Farzaneh Abazari, Fateme Shabani |
| 2023 | Quantum Key Distribution as a Service and Its Injection into TLS. Sergejs Kozlovics, Krisjanis Petrucena, Davis Larins, Juris Viksna |
| 2023 | RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files. P. Mohan Anand, P. V. Sai Charan, Hrushikesh Chunduri, Sandeep K. Shukla |
| 2023 | Recovering Multi-prime RSA Keys with Erasures and Errors. Guanghui Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao |
| 2023 | SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain. Ajay Chandra Korlapati, Sanjeet Kumar Nayak, Partha Sarathi Chakraborty, Somanath Tripathy |
| 2023 | Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition. Samaneh Mohammadi, Sima Sinaei, Ali Balador, Francesco Flammini |
| 2023 | Security Analysis of WAGE Against Division Property Based Cube Attack. Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury |
| 2023 | Tikuna: An Ethereum Blockchain Network Security Monitoring System. Andrés Gómez Ramirez, Loui Al Sardy, Francis Gomez Ramirez |
| 2023 | Transparent Security Method for Automating IoT Security Assessments. Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning |
| 2023 | When MPC in the Head Meets VC. Li Liu, Puwen Wei |
| 2023 | XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph. Ngo Duc Hoang Son, Huynh Thai Thi, Phan The Duy, Van-Hau Pham |
| 2023 | XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs. Yuki Nakagawa, Mamoru Mimura |