| 2021 | A Comparison of GKE Protocols based on SIDH. Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid |
| 2021 | A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments. Marco Pernpruner, Giada Sciarretta, Silvio Ranise |
| 2021 | A New Delegated Authentication Protocol based on PRE. Anass Sbai, Cyril Drocourt, Gilles Dequen |
| 2021 | A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE. Murat Burhan Ilter, Ali Aydin Selçuk |
| 2021 | A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks. Mateusz Kozlowski, Bogdan Ksiezopolski |
| 2021 | A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation. Basant Subba, Ayushi Singh |
| 2021 | A Scalable Bitcoin-based Public Key Certificate Management System. Chloe Tartan, Craig Wright, Michaella Pettit, Wei Zhang |
| 2021 | A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures. Stephan Seifermann, Robert Heinrich, Dominik Werle, Ralf H. Reussner |
| 2021 | AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method. Pritam Pallab, Abhijit Das |
| 2021 | Access Control Convergence: Challenges and Opportunities. Ravi S. Sandhu |
| 2021 | Accurate Measurement of the Energy Consumption of Security Functions. Benoît Fournier, Valérie Viet Triem Tong, Gilles Guette |
| 2021 | An Extension of the Avalanche Criterion in the Context of c-Differentials. Pål Ellingsen, Constanza Riera, Pantelimon Stanica, Anton Tkachenko |
| 2021 | An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning Algorithms. Gustavo Gonzalez Granadillo, Alejandro G. Bedoya, Rodrigo Diaz |
| 2021 | An Upcycling Tokenization Method for Credit Card Numbers. Cyrius Nugier, Diane Leblanc-Albarel, Agathe Blaise, Simon Masson, Paul Huynh, Yris Brice Wandji Piugie |
| 2021 | Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems. Raul Casanova Marques, Pavel Pascacio, Jan Hajny, Joaquín Torres-Sospedra |
| 2021 | Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems. Muhammad I. H. Sukmana, Kai-Oliver Kohlen, Carl Gödecken, Pascal Schulze, Christoph Meinel |
| 2021 | Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation. Felix Hörandner, Bernd Prünster |
| 2021 | Automated Symbolic Verification of Telegram's MTProto 2.0. Marino Miculan, Nicola Vitacolonna |
| 2021 | BLT+L: Efficient Signatures from Timestamping and Endorsements. Denis Firsov, Henri Lakk, Sven Laur, Ahto Truu |
| 2021 | Balancing Quality and Efficiency in Private Clustering with Affinity Propagation. Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame |
| 2021 | BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar |
| 2021 | Boolean Exponent Splitting. Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos |
| 2021 | C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments. Mitsuhiro Mabuchi, Koji Hasebe |
| 2021 | Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment? Salimeh Dashti, Anderson Santana de Oliveira, Caelin Kaplan, Manuel Dalcastagné, Silvio Ranise |
| 2021 | Can a TLS Certificate Be Phishy? Kaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen |
| 2021 | Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics. Denis Migdal, Ilaria Magotti, Christophe Rosenberger |
| 2021 | Cloud Key Management using Trusted Execution Environment. Jaouhara Bouamama, Mustapha Hedabou, Mohammed Erradi |
| 2021 | Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp). Wisnu Uriawan, Omar Hasan, Youakim Badr, Lionel Brunie |
| 2021 | Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains. Fabien Herbaut, Nicolas Méloni, Pascal Véron |
| 2021 | Comparing Classifiers' Performance under Differential Privacy. Milan Lopuhaä-Zwakenberg, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone |
| 2021 | Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities. Grzegorz J. Blinowski, Pawel Piotrowski, Michal Wisniewski |
| 2021 | Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment. Stefano Berlato, Roberto Carbone, Silvio Ranise |
| 2021 | Dynamic Access Control Framework for Enterprise Content Management Systems. Nadia Hocine, Ismail Bokhari |
| 2021 | Efficient Joint Random Number Generation for Secure Multi-party Computation. Erwin Hoogerwerf, Daphne van Tetering, Aslí Bay, Zekeriya Erkin |
| 2021 | Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky |
| 2021 | Enforcing Cardinality Constraint in Temporal RBAC. Sohail Rajdev, Barsha Mitra |
| 2021 | Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack. Kaito Uemura, Satoshi Obana |
| 2021 | Fair Mutual Authentication. Jacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski |
| 2021 | Fast Cramer-Shoup Cryptosystem. Pascal Lafourcade, Léo Robert, Demba Sow |
| 2021 | Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices. Karl Norrman, Vaishnavi Sundararajan, Alessandro Bruni |
| 2021 | Formal Proof of a Vulnerability in Z-Wave IoT Protocol. Mario Lilli, Chiara Braghin, Elvinia Riccobene |
| 2021 | Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS. Nils Mäurer, Christoph Gentsch, Thomas Gräupl, Corinna Schmitt |
| 2021 | GRANEF: Utilization of a Graph Database for Network Forensics. Milan Cermák, Denisa Sramkova |
| 2021 | Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434. Christophe Ponsard, Valéry Ramon, Jean-Christophe Deprez |
| 2021 | HIJaX: Human Intent JavaScript XSS Generator. Yaw Frempong, Yates Snyder, Erfan Al-Hossami, Meera Sridhar, Samira Shaikh |
| 2021 | Hashing to Prime in Zero-Knowledge. Thomas Groß |
| 2021 | Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert |
| 2021 | Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach. Marcin Gregorczyk, Wojciech Mazurczyk |
| 2021 | Investing Data with Untrusted Parties using HE. Mark Dockendorf, Ram Dantu, Kirill Morozov, Sanjukta Bhowmick |
| 2021 | Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC. Julius Hekkala, Sara Nikula, Outi-Marja Latvala, Kimmo Halunen |
| 2021 | MMU-based Access Control for Libraries. Marinos Tsantekidis, Vassilis Prevelakis |
| 2021 | Machine Learning Classification of Obfuscation using Image Visualization. Colby Parker, Jeffrey Todd McDonald, Dimitrios Damopoulos |
| 2021 | Mobile Family Detection through Audio Signals Classification. Rosangela Casolare, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2021 | Model Inversion for Impersonation in Behavioral Authentication Systems. Md. Morshedul Islam, Reihaneh Safavi-Naini |
| 2021 | Multi-Party Private Set Intersection Protocols for Practical Applications. Aslí Bay, Zeki Erkin, Mina Alishahi, Jelle Vos |
| 2021 | On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service. Anne V. D. M. Kayem, Nikolai J. Podlesny, Christoph Meinel |
| 2021 | PUF based Lightweight Authentication and Key Exchange Protocol for IoT. Sourav Roy, Dipnarayan Das, Anindan Mondal, Mahabub Hasan Mahalat, Suchismita Roy, Bibhash Sen |
| 2021 | Practically Efficient RFID Scheme with Constant-time Identification. Ferucio Laurentiu Tiplea, Cristian Hristea |
| 2021 | Preventing Watermark Forging Attacks in a MLaaS Environment. Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi |
| 2021 | Privacy Aura for Transparent Authentication on Multiple Smart Devices. Takoua Guiga, Jean-Jacques Schwartzmann, Christophe Rosenberger |
| 2021 | Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things. Hiral S. Trivedi, Sankita J. Patel |
| 2021 | Privacy-Preserving Analytics in the Big Data Environment. Jaideep Vaidya |
| 2021 | Private Set Intersection: Past, Present and Future. Ionita Andreea |
| 2021 | Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021. Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2021 | Program Protection through Software-based Hardware Abstraction. Jeffrey Todd McDonald, Ramya Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel |
| 2021 | Proof-of-Forgery for Hash-based Signatures. Evgeniy O. Kiktenko, Mikhail A. Kudinov, Andrey A. Bulychev, Aleksey K. Fedorov |
| 2021 | Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work. Efe Ulas Akay Seyitoglu, Attila Altay Yavuz, Thang Hoang |
| 2021 | Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model's Complexity. Mathias P. M. Parisot, Balázs Pejó, Dayana Spagnuelo |
| 2021 | Protecting End User's Privacy When using Social Login through GDPR Compliance. Carlos Villarán, Marta Beltrán |
| 2021 | Python and Malware: Developing Stealth and Evasive Malware without Obfuscation. Vasilios Koutsokostas, Constantinos Patsakis |
| 2021 | RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network. Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, Ghaleb Hoblos, Leïla Azouz Saïdane |
| 2021 | RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications. Mujahid Muhammad, Paul Kearney, Adel Aneiba, Junaid Arshad, Andreas Kunz |
| 2021 | Ransomware Detection using Markov Chain Models over File Headers. Nicolas Bailluet, Hélène Le Bouder, David Lubicz |
| 2021 | Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android. Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro |
| 2021 | SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance. Andreas Abraham, Christopher Schinnerl, Stefan More |
| 2021 | Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss. Florian Thaeter, Rüdiger Reischuk |
| 2021 | SecSDN: A Novel Architecture for a Secure SDN. Parjanya Vyas, R. K. Shyamasundar |
| 2021 | Secure Computation by Secret Sharing using Input Encrypted with Random Number. Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal |
| 2021 | Security Issues of Electronic and Mobile Banking. Wojciech Wodo, Damian Stygar, Przemyslaw Blaskiewicz |
| 2021 | Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation. Sara Foresti, Giovanni Livraga |
| 2021 | Side Channel Counter-measures based on Randomized AMNS Modular Multiplication. Christophe Nègre |
| 2021 | Signer and Message Ambiguity from a Variety of Keys. George Teseleanu |
| 2021 | Statically Identifying XSS using Deep Learning. Héloïse Maurel, Santiago A. Vidal, Tamara Rezk |
| 2021 | Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem. Ratna Dutta, Sumit Kumar Debnath, Chinmoy Biswas |
| 2021 | Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling. Kees Leune, Sung Kim |
| 2021 | Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving Micro-data Publishing and Analysis. Navoda Senavirathne, Vicenç Torra |
| 2021 | The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. Marius Schlegel, Peter Amthor |
| 2021 | Towards CRYSTALS-Kyber VHDL Implementation. Sara Ricci, Petr Jedlicka, Peter Cíbik, Petr Dzurenda, Lukas Malina, Jan Hajny |
| 2021 | Towards Integrating Security in Industrial Engineering Design Practices. Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis |
| 2021 | Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. Nazim Uddin Sheikh, Zhigang Lu, Hassan Asghar, Mohamed Ali Kâafar |
| 2021 | Trusted Enforcement of Application-specific Security Policies. Marius Schlegel |
| 2021 | User Identification from Time Series of Fitness Data. Thomas Marchioro, Andrei Kazlouski, Evangelos P. Markatos |
| 2021 | Using Program Analysis to Identify the Use of Vulnerable Functions. Rasmus Hagberg, Martin Hell, Christoph Reichenbach |
| 2021 | VEST: An Early Warning System for Future Cyber-Attacks. V. S. Subrahmanian |
| 2021 | Verify It Yourself: A Note on Activation Functions' Influence on Fast DeepFake Detection. Piotr Kawa, Piotr Syga |
| 2021 | Vulnerability Metrics for Graph-based Configuration Security. Ibifubara Iganibo, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito |