| 2023 | 5G Handover: When Forward Security Breaks. Navya Sivaraman, Simin Nadjm-Tehrani |
| 2023 | A 10-Layer Model for Service Availability Risk Management. Jan Marius Evang |
| 2023 | A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment. Mofareh Waqdan, Habib Louafi, Malek Mouhoub |
| 2023 | A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials. Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi |
| 2023 | A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things. Syed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage |
| 2023 | A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning. Amine Hattak, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2023 | A Note on a CBC-Type Mode of Operation. George Teseleanu |
| 2023 | A Rand Index-Based Analysis of Consensus Protocols. Sangita Roy, Rudrapatna K. Shyamasundar |
| 2023 | A Secure Emergency Framework in an IoT Based Patient Monitoring System. Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim |
| 2023 | A Two-Party Hierarchical Deterministic Wallets in Practice. ChihYun Chuang, IHung Hsu, TingFang Lee |
| 2023 | AIS Authentication Using Certificateless Cryptography. Axel Rousselot, Nora Cuppens, Samra Bouakkaz |
| 2023 | Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications. Francesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro |
| 2023 | Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration. Chirag Jaju, Dhairya Agrawal, Rishi Poddar, Shubh Badjate, Sidharth Anand, Barsha Mitra, Soumyadeep Dey |
| 2023 | Anomaly Detection in Smart Grid Networks Using Power Consumption Data. Hasina Rahman, Priyadarsi Nanda, Manoranjan Mohanty, Nazim Uddin Sheikh |
| 2023 | Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques. Davide Agostinello, Angelo Genovese, Vincenzo Piuri |
| 2023 | Approximate Homomorphic Pre-Processing for CNNs. Shabnam Khanna, Ciara Rafferty |
| 2023 | ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development. Cong-Binh Le, Bao-Thi Nguyen-Le, Phuoc-Loc Truong, Minh-Triet Tran, Anh-Duy Tran |
| 2023 | Automated Feature Engineering for AutoML Using Genetic Algorithms. Kevin Shi, Sherif Saad |
| 2023 | BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports. Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong |
| 2023 | BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments. Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic |
| 2023 | Blockchain Data Replication. Roberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo |
| 2023 | CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense. Trisha Chakraborty, Shaswata Mitra, Sudip Mittal |
| 2023 | CNN-HMM Model for Real Time DGA Categorization. Aimen Mahmood, Haider Abbas, M. Faisal Amjad |
| 2023 | Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme. Muhammad Nauman Khan, Asha Rao, Seyit Camtepe, Josef Pieprzyk |
| 2023 | Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. Matous Kozák, Martin Jurecek |
| 2023 | Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis. Arjun Prasad, Kevin Kanichery Biju, Soumya Somani, Barsha Mitra |
| 2023 | Data Protection and Security Issues with Network Error Logging. Libor Polcák, Kamil Jerábek |
| 2023 | Defeating MageCart Attacks in a NAISS Way. Catalin Rus, Dipti Kapoor Sarmah, Mohammed El-Hajj |
| 2023 | Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption. Mohamed Salah Azzaz, Redouane Kaibou, Hamdane Kamelia, Abdenour Kifouche, Djamel Teguig |
| 2023 | Detecting BrakTooth Attacks. Achyuth Nandikotkur, Issa Traoré, Mohammad Mamun |
| 2023 | ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract. Rudrapatna K. Shyamasundar |
| 2023 | Evaluating Label Flipping Attack in Deep Learning-Based NIDS. Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani |
| 2023 | Fidelis: Verifiable Keyword Search with No Trust Assumption. Laltu Sardar, Subhra Mazumdar |
| 2023 | Generic Blockchain on Generic Human Behavior. Clémentine Gritti, Frédéric A. Hayek, Pascal Lafourcade |
| 2023 | Griffin: Towards Mixed Multi-Key Homomorphic Encryption. Thomas Schneider, Hossein Yalame, Michael Yonli |
| 2023 | Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets. Brian Lewandowski |
| 2023 | Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives. Mark Dockendorf, Ram Dantu |
| 2023 | How to Plausibly Deny Steganographic Secrets. Shahzad Ahmad, Stefan Rass |
| 2023 | IMAGINE Dataset: Digital Camera Identification Image Benchmarking Dataset. Jaroslaw Bernacki, Rafal Scherer |
| 2023 | Improvement of Winternitz OTS with a Novel Fingerprinting Function. Motonari Honda, Yuichi Kaji |
| 2023 | Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized Approaches. Amani Bacha, Farah Barika Ktata, Faten Louati |
| 2023 | Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach. Md. Al Amin, Amani Altarawneh, Indrajit Ray |
| 2023 | International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed "Hakoniwa". Satoshi Kai, Takao Kondo, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka |
| 2023 | JShelter: Give Me My Browser Back. Libor Polcák, Marek Salon, Giorgio Maone, Radek Hranický, Michael McMahon |
| 2023 | K-Anonymous Privacy Preserving Manifold Learning. Sonakshi Garg, Vicenç Torra |
| 2023 | Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models. Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Luca Piras, Andrei Petrovski |
| 2023 | Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code. Patrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl |
| 2023 | Lattice-Based Threshold Signature Implementation for Constrained Devices. Patrik Dobias, Sara Ricci, Petr Dzurenda, Lukas Malina, Nikita Snetkov |
| 2023 | Lessons Learned: Defending Against Property Inference Attacks. Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath |
| 2023 | Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid. Arne Roar Nygård, Sokratis K. Katsikas |
| 2023 | Light Quantum Key Distribution Network Security Estimation Tool. Sara Nikula, Pekka Koskela, Outi-Marja Latvala, Sami Lehtonen |
| 2023 | Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys. Marina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga |
| 2023 | MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware. David Schrammel, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, Stefan Mangard |
| 2023 | Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement. Alexandre Augusto Giron |
| 2023 | Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning. Myria Bouhaddi, Kamel Adi |
| 2023 | OCScraper: Automated Analysis of the Fingerprintability of the iOS API. Gerald Palfinger |
| 2023 | On Single-Server Delegation Without Precomputation. Matluba Khodjaeva, Giovanni Di Crescenzo |
| 2023 | On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data. Zeynep Sila Kaya, Mehmet Emre Gursoy |
| 2023 | On the Implementation of a Lattice-Based Revocable Hierarchical Ibe. Mikael Carmona, Doryan Lesaignoux, Antoine Loiseau |
| 2023 | On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication. Mustapha Benssalah, Karim Drouiche |
| 2023 | One to Bind Them: Binding Verifiable Credentials to User Attributes. Alexander Mühle, Katja Assaf, Christoph Meinel |
| 2023 | Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures. Alexandru Ionita |
| 2023 | PIUDI: Private Information Update for Distributed Infrastructure. Shubham Raj, Snehil Joshi, Kannan Srinathan |
| 2023 | Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks. Kayode S. Adewole, Vicenç Torra |
| 2023 | Privacy in Practice: Private COVID-19 Detection in X-Ray Images. Lucas Lange, Maja Schneider, Peter Christen, Erhard Rahm |
| 2023 | Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs. Mark Dockendorf, Ram Dantu |
| 2023 | Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023. Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2023 | Proctoring Online Exam Using Eye Tracking. Waheeb Yaqub, Manoranjan Mohanty, Basem Suleiman |
| 2023 | RSSI-Based Fingerprinting of Bluetooth Low Energy Devices. Guillaume Gagnon, Sébastien Gambs, Mathieu Cunche |
| 2023 | Receipt-Free Electronic Voting from zk-SNARK. Maryam Sheikhi, Rosario Giustolisi, Carsten Schürmann |
| 2023 | Regulating Cyber Incidents: A Review of Recent Reporting Requirements. Angelica Marotta, Stuart E. Madnick |
| 2023 | Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis. Kazutaka Matsuzaki, Kenji Sawada, Shinichi Honiden |
| 2023 | Risk-Based Illegal Information Flow Detection in the IIoT. Argiro Anagnostopoulou, Ioannis Mavridis, Dimitris Gritzalis |
| 2023 | Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices. Arijit Karati, Yu-Sheng Chang, Ting-Yu Chen |
| 2023 | SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme. Sehrish Shafeeq, Mathias Fischer |
| 2023 | SQLi Detection with ML: A Data-Source Perspective. Balázs Pejó, Nikolett Kapui |
| 2023 | Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries. Catalin V. Bîrjoveanu, Mirela Bîrjoveanu |
| 2023 | Security for Distributed Machine Learning. Laurent Gomez, Tianchi Yu, Patrick Duverger |
| 2023 | Security for Next-Gen Analytics for Cross-Organisation Collaboration. Laurent Gomez, Francesco Capano, Patrick Duverger |
| 2023 | Self-Sovereign Identity (SSI) Attribute-Based Web Authentication. Biagio Boi, Marco De Santis, Christian Esposito |
| 2023 | Smart Bulbs Can Be Hacked to Hack into Your Household. Davide Bonaventura, Sergio Esposito, Giampaolo Bella |
| 2023 | Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems. Roland Czerny, Christian Kollmann, Blaz Podgorelec, Bernd Prünster, Thomas Zefferer |
| 2023 | SoK: Towards CCA Secure Fully Homomorphic Encryption. Hiroki Okada, Kazuhide Fukushima |
| 2023 | The Certification Panacea. Rigo Wenning |
| 2023 | The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis. Wisam Abbasi, Paolo Mori, Andrea Saracino |
| 2023 | Threshold Cryptosystems Based on 2^k-th Power Residue Symbols. George Teseleanu |
| 2023 | Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility. Dario Castellano, Roberto De Prisco, Pompeo Faruolo |
| 2023 | Towards Usable Scoring of Common Weaknesses. Olutola Adebiyi, Massimiliano Albanese |
| 2023 | Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks. Rocco Zaccagnino, Antonio Cirillo, Alfonso Guarino, Nicola Lettieri, Delfina Malandrino, Gianluca Zaccagnino |
| 2023 | Trans-IDS: A Transformer-Based Intrusion Detection System. El Mahdi Mercha, El Mostapha Chakir, Mohammed Erradi |
| 2023 | Unclonable Cryptography: A Tale of Two No-Cloning Paradigms. Ghada Almashaqbeh, Rohit Chatterjee |
| 2023 | Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda |
| 2023 | Using Untrusted and Unreliable Cloud Providers to Obtain Private Email. Nicolas Chiapputo, Yvo Desmedt, Kirill Morozov |
| 2023 | VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations. Quentin L. Meunier, Abdul Rahman Taleb |
| 2023 | Virtual Private Networks in the Quantum Era: A Security in Depth Approach. David Schatz, Friedrich Altheide, Hedwig Koerfgen, Michael Rossberg, Guenter Schaefer |
| 2023 | WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers. Pascal Wichmann, Sam Ansari, Hannes Federrath, Jens Lindemann |
| 2023 | When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, Dimos Mellios, Damian A. Tamburri |
| 2023 | XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement. Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng |
| 2023 | ZT-NIDS: Zero Trust, Network Intrusion Detection System. Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He |
| 2023 | Δ SFL: (Decoupled Server Federated Learning) to Utilize DLG Attacks in Federated Learning by Decoupling the Server. Sudipta Paul, Vicenç Torra |