SECRYPT C

85 papers

YearTitle / Authors
2022A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts.
Abubakar-Sadiq Shehu, António Pinto, Manuel Eduardo Correia
2022A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication.
Ahmed Fraz Baig, Sigurd Eskeland
2022A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization.
Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Biju Issac, Eve O'Brien
2022A Longitudinal Study of Cryptographic API: A Decade of Android Malware.
Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto
2022A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning.
Giuseppe Crincoli, Fabiana Fierro, Giacomo Iadarola, Piera Elena La Rocca, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2022A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search.
Samiran Bag, Indranil Ghosh Ray, Feng Hao
2022A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing.
Benjamin Aziz, Aysha Bukhelli, Rinat Khusainov, Alaa Mohasseb
2022A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning.
Francesco Mercaldo, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Ranieri, Antonella Santone
2022A Region-based Training Data Segmentation Strategy to Credit Scoring.
Roberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu
2022A Secure Federated Learning: Analysis of Different Cryptographic Tools.
Oana Stan, Vincent Thouvenot, Aymen Boudguiga, Katarzyna Kapusta, Martin Zuber, Renaud Sirdey
2022A Spendable Cold Wallet from QR Video.
Rafael Dowsley, Mylène C. Q. Farias, Mario Larangeira, Anderson Nascimento, Jot Virdee
2022An Adaptive Web Application Firewall.
Miguel Calvo, Marta Beltrán
2022Application Sandboxing for Linux Desktops: A User-friendly Approach.
Lukas Brodschelm, Marcus Gelderie
2022Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper).
Yvo Desmedt
2022Authentication Attacks on Projection-based Cancelable Biometric Schemes.
Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Denis Migdal, Kevin Thiry-Atighehchi
2022Behavior Modeling of a Distributed Application for Anomaly Detection.
Amanda B. Viescinski, Tiago Heinrich, Newton Carlos Will, Carlos Maziero
2022Blind Side Channel on the Elephant LFSR.
Awaleh Houssein Meraneh, Christophe Clavier, Hélène Le Bouder, Julien Maillard, Gaël Thomas
2022Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach.
Roberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu
2022Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0.
Santiago de Diego, Oscar Lage, Cristina Regueiro, Sergio Anguita, Gabriel Maciá-Fernández
2022CRGC: A Practical Framework for Constructing Reusable Garbled Circuits.
Christopher Harth-Kitzerow, Georg Carle, Fan Fei, André Luckow, Johannes Klepsch
2022CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party.
Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld
2022Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key.
Jayashree Dey, Ratna Dutta
2022Collusion-resistant Broadcast Encryption based on Hidden RSA Subgroups.
Sigurd Eskeland
2022Comparison-based MPC in Star Topology.
Gowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
2022Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme.
Sigurd Eskeland, Ahmed Fraz Baig
2022Cyber Security When IT Meets OT.
Sokratis K. Katsikas
2022Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric.
Amisha Sinha, Debanjan Sadhya
2022Discovering How to Attack a System.
Fabrizio Baiardi, Daria Maggi, Mauro Passacantando
2022Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell).
Luca Viganò
2022Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs.
Jeffrey Todd McDonald, Jennifer Parnell, Todd R. Andel, Samuel H. Russ
2022Efficient Hybrid Model for Intrusion Detection Systems.
Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez Granadillo
2022Efficient IoT Device Fingerprinting Approach using Machine Learning.
Richmond Osei, Habib Louafi, Malek Mouhoub, Zhongwen Zhu
2022Evaluation of AI-based Malware Detection in IoT Network Traffic.
Nuno Prazeres, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão
2022FAPRIL: Towards Faster Privacy-preserving Fingerprint-based Localization.
Christopher van der Beets, Raine Nieminen, Thomas Schneider
2022Federated Naive Bayes under Differential Privacy.
Thomas Marchioro, Lodovico Giaretta, Evangelos P. Markatos, Sarunas Girdzijauskas
2022From GDPR to Privacy Design Patterns: The MATERIALIST Framework.
Vita Santa Barletta, Giuseppe Desolda, Domenico Gigante, Rosa Lanzilotti, Marco Saltarella
2022GAN-based Approach to Crafting Adversarial Malware Examples against a Heterogeneous Ensemble Classifier.
Saad Al-Ahmadi, Saud Al-Eyead
2022Graph Algorithms over Homomorphic Encryption for Data Cooperatives.
Mark Dockendorf, Ram Dantu, John Long
2022HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing.
Animesh Kar, Andrei Natadze, Enrico Branca, Natalia Stakhanova
2022Identifying Organizations Receiving Personal Data in Android Apps.
David Rodríguez Torrado, Miguel Cozar, José M. del Álamo
2022Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual Information.
Giuseppe Cascavilla, Gemma Catolino, Mirella Sangiovanni
2022Implementation of a Stateful Network Protocol Intrusion Detection Systems.
S. Seng, Joaquín García-Alfaro, Y. Laarouci
2022Irreversible Applications for Windows NT Systems.
Rahul Sankalana Gunawardhana, Kavinga Yapa Abeywardena
2022JCAlgTest: Robust Identification Metadata for Certified Smartcards.
Petr Svenda, Rudolf Kvasnovský, Imrich Nagy, Antonín Dufka
2022Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property.
Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay
2022Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions.
Dusan Klinec, Marek Sýs, Karel Kubicek, Petr Svenda, Vashek Matyás
2022Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses.
Ibifubara Iganibo, Massimiliano Albanese, Kaan Turkmen, Thomas R. Campbell, Marc Mosko
2022Membership Inference Attacks on Aggregated Time Series with Linear Programming.
Antonin Voyez, Tristan Allard, Gildas Avoine, Pierre Cauchois, Élisa Fromont, Matthieu Simonin
2022Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict?
Libor Polcák, Petr Matousek
2022Moving Target Defense Router: MaTaDoR.
Berkan Ufuk, Mehmet Tahir Sandikkaya
2022Near-collisions and Their Impact on Biometric Security.
Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi
2022Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy Consumption.
Saqib Javed, Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat
2022Offline-verifiable Data from Distributed Ledger-based Registries.
Stefan More, Jakob Heher, Clemens Walluschek
2022On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
Lukas Malina, Sara Ricci, Patrik Dobias, Petr Jedlicka, Jan Hajny, Kim-Kwang Raymond Choo
2022On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis.
Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi
2022PAMMELA: Policy Administration Methodology using Machine Learning.
Varun Gumma, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das, Jaideep Vaidya
2022PASS-P: Performance and Security Sensitive Dynamic Cache Partitioning.
Nirmal Kumar Boran, Pranil Joshi, Virendra Singh
2022PE-AONT: Partial Encryption All or Nothing Transform.
Katarzyna Kapusta, Gérard Memmi
2022Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2).
Rahul Roy, Abhijit Das, Dipanwita Roy Chowdhury
2022Partially Oblivious Neural Network Inference.
Panagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes
2022PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks.
Tristan Bilot, Grégoire Geis, Badis Hammi
2022Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022.
Sabrina De Capitani di Vimercati, Pierangela Samarati
2022Real-time Crowd Counting based on Wearable Ephemeral IDs.
Daniel Morales, Isaac Agudo, Javier López
2022Resilience of GANs against Adversarial Attacks.
Kyrylo Rudavskyy, Ali Miri
2022Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations.
Arne Roar Nygård, Arvind Sharma, Sokratis K. Katsikas
2022Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures.
Loris Dal Lago, Fabio Federici, Davide Martintoni, Valerio Senni
2022SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge.
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche
2022SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes.
Antonín Dufka, Vladimir Sedlacek, Petr Svenda
2022Seccomp Filters from Fuzzing.
Marcus Gelderie, Valentin Barth, Maximilian Luff, Julian Birami
2022Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature.
Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley
2022Stacked Ensemble Model for Enhancing the DL based SCA.
Anh-Tuan Hoang, Neil Hanley, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O'Neill
2022Switched-based Control Testbed to Assure Cyber-physical Resilience by Design.
Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro
2022The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems.
Eva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos
2022Threats to Adversarial Training for IDSs and Mitigation.
Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet
2022Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb.
David Holm Audran, Marcus Braunschweig Andersen, Mark Højer Hansen, Mikkel Møller Andersen, Thomas B. Frederiksen, Kasper H. Hansen, Dimitrios Georgoulias, Emmanouil Vasilomanolakis
2022Towards Heterogeneous Remote Attestation Protocols.
Paul Georg Wagner, Jürgen Beyerer
2022Towards a Threat Model and Security Analysis for Data Cooperatives.
Abiola Salau, Ram Dantu, Kirill Morozov, Kritagya Upadhyay, Syed Badruddoja
2022Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach.
Panagiotis Dedousis, Melina Raptaki, George Stergiopoulos, Dimitris Gritzalis
2022Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention.
Zelong Li, Akhilesh Tyagi
2022TrustLend: Using Borrower Trustworthiness for Lending on Ethereum.
Wisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie
2022Verification of PUF-based IoT Protocols with AVISPA and Scyther.
Tomás Rabas, Róbert Lórencz, Jirí Bucek
2022Weighted Attribute-based Encryption with Parallelized Decryption.
Alexandru Ionita
2022What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets.
Andrei Kazlouski, Thomas Marchioro, Evangelos P. Markatos
2022Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES.
Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz
2022zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable Computation.
Thomas Lavaur, Jérôme Lacan