SECRYPT C

96 papers

YearTitle / Authors
2021A Comparison of GKE Protocols based on SIDH.
Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid
2021A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments.
Marco Pernpruner, Giada Sciarretta, Silvio Ranise
2021A New Delegated Authentication Protocol based on PRE.
Anass Sbai, Cyril Drocourt, Gilles Dequen
2021A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE.
Murat Burhan Ilter, Ali Aydin Selçuk
2021A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks.
Mateusz Kozlowski, Bogdan Ksiezopolski
2021A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation.
Basant Subba, Ayushi Singh
2021A Scalable Bitcoin-based Public Key Certificate Management System.
Chloe Tartan, Craig Wright, Michaella Pettit, Wei Zhang
2021A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.
Stephan Seifermann, Robert Heinrich, Dominik Werle, Ralf H. Reussner
2021AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method.
Pritam Pallab, Abhijit Das
2021Access Control Convergence: Challenges and Opportunities.
Ravi S. Sandhu
2021Accurate Measurement of the Energy Consumption of Security Functions.
Benoît Fournier, Valérie Viet Triem Tong, Gilles Guette
2021An Extension of the Avalanche Criterion in the Context of c-Differentials.
Pål Ellingsen, Constanza Riera, Pantelimon Stanica, Anton Tkachenko
2021An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning Algorithms.
Gustavo Gonzalez Granadillo, Alejandro G. Bedoya, Rodrigo Diaz
2021An Upcycling Tokenization Method for Credit Card Numbers.
Cyrius Nugier, Diane Leblanc-Albarel, Agathe Blaise, Simon Masson, Paul Huynh, Yris Brice Wandji Piugie
2021Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems.
Raul Casanova Marques, Pavel Pascacio, Jan Hajny, Joaquín Torres-Sospedra
2021Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems.
Muhammad I. H. Sukmana, Kai-Oliver Kohlen, Carl Gödecken, Pascal Schulze, Christoph Meinel
2021Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation.
Felix Hörandner, Bernd Prünster
2021Automated Symbolic Verification of Telegram's MTProto 2.0.
Marino Miculan, Nicola Vitacolonna
2021BLT+L: Efficient Signatures from Timestamping and Endorsements.
Denis Firsov, Henri Lakk, Sven Laur, Ahto Truu
2021Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
2021BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain.
I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar
2021Boolean Exponent Splitting.
Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos
2021C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments.
Mitsuhiro Mabuchi, Koji Hasebe
2021Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment?
Salimeh Dashti, Anderson Santana de Oliveira, Caelin Kaplan, Manuel Dalcastagné, Silvio Ranise
2021Can a TLS Certificate Be Phishy?
Kaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen
2021Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics.
Denis Migdal, Ilaria Magotti, Christophe Rosenberger
2021Cloud Key Management using Trusted Execution Environment.
Jaouhara Bouamama, Mustapha Hedabou, Mohammed Erradi
2021Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp).
Wisnu Uriawan, Omar Hasan, Youakim Badr, Lionel Brunie
2021Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains.
Fabien Herbaut, Nicolas Méloni, Pascal Véron
2021Comparing Classifiers' Performance under Differential Privacy.
Milan Lopuhaä-Zwakenberg, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone
2021Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities.
Grzegorz J. Blinowski, Pawel Piotrowski, Michal Wisniewski
2021Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment.
Stefano Berlato, Roberto Carbone, Silvio Ranise
2021Dynamic Access Control Framework for Enterprise Content Management Systems.
Nadia Hocine, Ismail Bokhari
2021Efficient Joint Random Number Generation for Secure Multi-party Computation.
Erwin Hoogerwerf, Daphne van Tetering, Aslí Bay, Zekeriya Erkin
2021Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play.
I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky
2021Enforcing Cardinality Constraint in Temporal RBAC.
Sohail Rajdev, Barsha Mitra
2021Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack.
Kaito Uemura, Satoshi Obana
2021Fair Mutual Authentication.
Jacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski
2021Fast Cramer-Shoup Cryptosystem.
Pascal Lafourcade, Léo Robert, Demba Sow
2021Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices.
Karl Norrman, Vaishnavi Sundararajan, Alessandro Bruni
2021Formal Proof of a Vulnerability in Z-Wave IoT Protocol.
Mario Lilli, Chiara Braghin, Elvinia Riccobene
2021Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS.
Nils Mäurer, Christoph Gentsch, Thomas Gräupl, Corinna Schmitt
2021GRANEF: Utilization of a Graph Database for Network Forensics.
Milan Cermák, Denisa Sramkova
2021Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434.
Christophe Ponsard, Valéry Ramon, Jean-Christophe Deprez
2021HIJaX: Human Intent JavaScript XSS Generator.
Yaw Frempong, Yates Snyder, Erfan Al-Hossami, Meera Sridhar, Samira Shaikh
2021Hashing to Prime in Zero-Knowledge.
Thomas Groß
2021Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
2021Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach.
Marcin Gregorczyk, Wojciech Mazurczyk
2021Investing Data with Untrusted Parties using HE.
Mark Dockendorf, Ram Dantu, Kirill Morozov, Sanjukta Bhowmick
2021Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC.
Julius Hekkala, Sara Nikula, Outi-Marja Latvala, Kimmo Halunen
2021MMU-based Access Control for Libraries.
Marinos Tsantekidis, Vassilis Prevelakis
2021Machine Learning Classification of Obfuscation using Image Visualization.
Colby Parker, Jeffrey Todd McDonald, Dimitrios Damopoulos
2021Mobile Family Detection through Audio Signals Classification.
Rosangela Casolare, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2021Model Inversion for Impersonation in Behavioral Authentication Systems.
Md. Morshedul Islam, Reihaneh Safavi-Naini
2021Multi-Party Private Set Intersection Protocols for Practical Applications.
Aslí Bay, Zeki Erkin, Mina Alishahi, Jelle Vos
2021On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service.
Anne V. D. M. Kayem, Nikolai J. Podlesny, Christoph Meinel
2021PUF based Lightweight Authentication and Key Exchange Protocol for IoT.
Sourav Roy, Dipnarayan Das, Anindan Mondal, Mahabub Hasan Mahalat, Suchismita Roy, Bibhash Sen
2021Practically Efficient RFID Scheme with Constant-time Identification.
Ferucio Laurentiu Tiplea, Cristian Hristea
2021Preventing Watermark Forging Attacks in a MLaaS Environment.
Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi
2021Privacy Aura for Transparent Authentication on Multiple Smart Devices.
Takoua Guiga, Jean-Jacques Schwartzmann, Christophe Rosenberger
2021Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things.
Hiral S. Trivedi, Sankita J. Patel
2021Privacy-Preserving Analytics in the Big Data Environment.
Jaideep Vaidya
2021Private Set Intersection: Past, Present and Future.
Ionita Andreea
2021Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021.
Sabrina De Capitani di Vimercati, Pierangela Samarati
2021Program Protection through Software-based Hardware Abstraction.
Jeffrey Todd McDonald, Ramya Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel
2021Proof-of-Forgery for Hash-based Signatures.
Evgeniy O. Kiktenko, Mikhail A. Kudinov, Andrey A. Bulychev, Aleksey K. Fedorov
2021Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work.
Efe Ulas Akay Seyitoglu, Attila Altay Yavuz, Thang Hoang
2021Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model's Complexity.
Mathias P. M. Parisot, Balázs Pejó, Dayana Spagnuelo
2021Protecting End User's Privacy When using Social Login through GDPR Compliance.
Carlos Villarán, Marta Beltrán
2021Python and Malware: Developing Stealth and Evasive Malware without Obfuscation.
Vasilios Koutsokostas, Constantinos Patsakis
2021RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network.
Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, Ghaleb Hoblos, Leïla Azouz Saïdane
2021RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications.
Mujahid Muhammad, Paul Kearney, Adel Aneiba, Junaid Arshad, Andreas Kunz
2021Ransomware Detection using Markov Chain Models over File Headers.
Nicolas Bailluet, Hélène Le Bouder, David Lubicz
2021Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android.
Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro
2021SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance.
Andreas Abraham, Christopher Schinnerl, Stefan More
2021Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss.
Florian Thaeter, Rüdiger Reischuk
2021SecSDN: A Novel Architecture for a Secure SDN.
Parjanya Vyas, R. K. Shyamasundar
2021Secure Computation by Secret Sharing using Input Encrypted with Random Number.
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2021Security Issues of Electronic and Mobile Banking.
Wojciech Wodo, Damian Stygar, Przemyslaw Blaskiewicz
2021Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation.
Sara Foresti, Giovanni Livraga
2021Side Channel Counter-measures based on Randomized AMNS Modular Multiplication.
Christophe Nègre
2021Signer and Message Ambiguity from a Variety of Keys.
George Teseleanu
2021Statically Identifying XSS using Deep Learning.
Héloïse Maurel, Santiago A. Vidal, Tamara Rezk
2021Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem.
Ratna Dutta, Sumit Kumar Debnath, Chinmoy Biswas
2021Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling.
Kees Leune, Sung Kim
2021Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving Micro-data Publishing and Analysis.
Navoda Senavirathne, Vicenç Torra
2021The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis.
Marius Schlegel, Peter Amthor
2021Towards CRYSTALS-Kyber VHDL Implementation.
Sara Ricci, Petr Jedlicka, Peter Cíbik, Petr Dzurenda, Lukas Malina, Jan Hajny
2021Towards Integrating Security in Industrial Engineering Design Practices.
Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis
2021Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates.
Nazim Uddin Sheikh, Zhigang Lu, Hassan Asghar, Mohamed Ali Kâafar
2021Trusted Enforcement of Application-specific Security Policies.
Marius Schlegel
2021User Identification from Time Series of Fitness Data.
Thomas Marchioro, Andrei Kazlouski, Evangelos P. Markatos
2021Using Program Analysis to Identify the Use of Vulnerable Functions.
Rasmus Hagberg, Martin Hell, Christoph Reichenbach
2021VEST: An Early Warning System for Future Cyber-Attacks.
V. S. Subrahmanian
2021Verify It Yourself: A Note on Activation Functions' Influence on Fast DeepFake Detection.
Piotr Kawa, Piotr Syga
2021Vulnerability Metrics for Graph-based Configuration Security.
Ibifubara Iganibo, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito