ISC C

24 papers

YearTitle / Authors
2019Adding Linkability to Ring Signatures with One-Time Signatures.
Xueli Wang, Yu Chen, Xuecheng Ma
2019An Analysis of Malware Trends in Enterprise Networks.
Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda
2019Auditable Compressed Storage.
Iraklis Leontiadis, Reza Curtmola
2019Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics.
Syed Ali Qasim, Juan Lopez Jr., Irfan Ahmed
2019Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces.
Carter Yagemann, Salmin Sultana, Li Chen, Wenke Lee
2019Can Today's Machine Learning Pass Image-Based Turing Tests?
Apostolis Zarras, Ilias Gerostathopoulos, Daniel Méndez Fernández
2019Code-Based Zero Knowledge PRF Arguments.
Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa
2019Cryptographic Authentication from the Iris.
Sailesh Simhadri, James Steel, Benjamin Fuller
2019Cube Cryptanalysis of Round-Reduced ACORN.
Jingchun Yang, Meicheng Liu, Dongdai Lin
2019Decentralized Evaluation of Quadratic Polynomials on Encrypted Data.
Chloé Hébant, Duong Hieu Phan, David Pointcheval
2019Full Database Reconstruction with Access and Search Pattern Leakage.
Evangelia Anna Markatou, Roberto Tamassia
2019Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists.
Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda
2019IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate.
Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu, Zheng Yang
2019Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings
Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis
2019L(a)ying in (Test)Bed - How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification.
Tamy Beppler, Marcus Botacin, Fabricio Ceschin, Luiz E. S. Oliveira, André Grégio
2019LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang
2019Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries.
Evangelia Anna Markatou, Roberto Tamassia
2019On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation.
Yanhua Zhang, Yupu Hu, Qikun Zhang, Huiwen Jia
2019PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography.
Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas
2019Robust Covert Channels Based on DRAM Power Consumption.
Thales Bandiera Paiva, Javier Navaridas, Routo Terada
2019Robust Distributed Pseudorandom Functions for mNP Access Structures.
Bei Liang, Aikaterini Mitrokotsa
2019Secure Stern Signatures in Quantum Random Oracle Model.
Hanwen Feng, Jianwei Liu, Qianhong Wu
2019Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking.
Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos
2019When the Attacker Knows a Lot: The GAGA Graph Anonymizer.
Arash Alavi, Rajiv Gupta, Zhiyun Qian