| 2020 | A Framework for Estimating Privacy Risk Scores of Mobile Apps. Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber |
| 2020 | An Accountable Decryption System Based on Privacy-Preserving Smart Contracts. Rujia Li, Qin Wang, Feng Liu, Qi Wang, David Galindo |
| 2020 | Analyzing the Chain of Trust Model Based on Entity Dependence. Ge Cheng, Hui Xie, Dongliang Zhang |
| 2020 | Anonymous IBE from Quadratic Residuosity with Fast Encryption. Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng |
| 2020 | BlockVoke - Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust. Abba Garba, Arne Bochem, Benjamin Leiding |
| 2020 | Characterizing Erasable Accounts in Ethereum. Xiaoqi Li, Ting Chen, Xiapu Luo, Jiangshan Yu |
| 2020 | Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. Rouzbeh Behnia, Attila Altay Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen |
| 2020 | ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks. Zuchao Ma, Liang Liu, Weizhi Meng |
| 2020 | Evaluation on the Security of Commercial Cloud Container Services. Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, Jingzi Meng |
| 2020 | Formalizing Bitcoin Crashes with Universally Composable Security. Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu |
| 2020 | Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan |
| 2020 | Integerwise Functional Bootstrapping on TFHE. Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid |
| 2020 | Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints. Saihua Cai, Jinfu Chen, Xinru Li, Bo Liu |
| 2020 | On the Struggle Bus: A Detailed Security Analysis of the m-tickets App. Jorge Sanz Maroto, Haoyu Liu, Paul Patras |
| 2020 | Privacy-Preserving Computation of the Earth Mover's Distance. Alberto Blanco-Justicia, Josep Domingo-Ferrer |
| 2020 | Public-PEZ Cryptography. Soma Murata, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone |
| 2020 | PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition. Mauro Conti, Pier Paolo Tricomi |
| 2020 | Rotational Cryptanalysis of Salsa Core Function. Ryoma Ito |
| 2020 | Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance. Youle Xu, Qichun Wang |
| 2020 | Time-Specific Signatures. Masahito Ishizaka, Shinsaku Kiyomoto |
| 2020 | Towards Transparent Control-Flow Integrity in Safety-Critical Systems. Don Kuzhiyelil, Philipp Zieris, Marine Kadar, Sergey Tverdyshev, Gerhard Fohler |
| 2020 | Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials. Xin Chen, Liang Feng Zhang |
| 2020 | Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel. Haoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia |
| 2020 | Why Current Statistical Approaches to Ransomware Detection Fail. Jamie Pont, Budi Arief, Julio C. Hernandez-Castro |