SECRYPT C

100 papers

YearTitle / Authors
20235G Handover: When Forward Security Breaks.
Navya Sivaraman, Simin Nadjm-Tehrani
2023A 10-Layer Model for Service Availability Risk Management.
Jan Marius Evang
2023A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment.
Mofareh Waqdan, Habib Louafi, Malek Mouhoub
2023A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials.
Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi
2023A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things.
Syed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage
2023A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning.
Amine Hattak, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2023A Note on a CBC-Type Mode of Operation.
George Teseleanu
2023A Rand Index-Based Analysis of Consensus Protocols.
Sangita Roy, Rudrapatna K. Shyamasundar
2023A Secure Emergency Framework in an IoT Based Patient Monitoring System.
Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim
2023A Two-Party Hierarchical Deterministic Wallets in Practice.
ChihYun Chuang, IHung Hsu, TingFang Lee
2023AIS Authentication Using Certificateless Cryptography.
Axel Rousselot, Nora Cuppens, Samra Bouakkaz
2023Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications.
Francesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro
2023Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration.
Chirag Jaju, Dhairya Agrawal, Rishi Poddar, Shubh Badjate, Sidharth Anand, Barsha Mitra, Soumyadeep Dey
2023Anomaly Detection in Smart Grid Networks Using Power Consumption Data.
Hasina Rahman, Priyadarsi Nanda, Manoranjan Mohanty, Nazim Uddin Sheikh
2023Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques.
Davide Agostinello, Angelo Genovese, Vincenzo Piuri
2023Approximate Homomorphic Pre-Processing for CNNs.
Shabnam Khanna, Ciara Rafferty
2023ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development.
Cong-Binh Le, Bao-Thi Nguyen-Le, Phuoc-Loc Truong, Minh-Triet Tran, Anh-Duy Tran
2023Automated Feature Engineering for AutoML Using Genetic Algorithms.
Kevin Shi, Sherif Saad
2023BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports.
Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong
2023BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments.
Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic
2023Blockchain Data Replication.
Roberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo
2023CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense.
Trisha Chakraborty, Shaswata Mitra, Sudip Mittal
2023CNN-HMM Model for Real Time DGA Categorization.
Aimen Mahmood, Haider Abbas, M. Faisal Amjad
2023Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme.
Muhammad Nauman Khan, Asha Rao, Seyit Camtepe, Josef Pieprzyk
2023Combining Generators of Adversarial Malware Examples to Increase Evasion Rate.
Matous Kozák, Martin Jurecek
2023Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis.
Arjun Prasad, Kevin Kanichery Biju, Soumya Somani, Barsha Mitra
2023Data Protection and Security Issues with Network Error Logging.
Libor Polcák, Kamil Jerábek
2023Defeating MageCart Attacks in a NAISS Way.
Catalin Rus, Dipti Kapoor Sarmah, Mohammed El-Hajj
2023Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption.
Mohamed Salah Azzaz, Redouane Kaibou, Hamdane Kamelia, Abdenour Kifouche, Djamel Teguig
2023Detecting BrakTooth Attacks.
Achyuth Nandikotkur, Issa Traoré, Mohammad Mamun
2023ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract.
Rudrapatna K. Shyamasundar
2023Evaluating Label Flipping Attack in Deep Learning-Based NIDS.
Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani
2023Fidelis: Verifiable Keyword Search with No Trust Assumption.
Laltu Sardar, Subhra Mazumdar
2023Generic Blockchain on Generic Human Behavior.
Clémentine Gritti, Frédéric A. Hayek, Pascal Lafourcade
2023Griffin: Towards Mixed Multi-Key Homomorphic Encryption.
Thomas Schneider, Hossein Yalame, Michael Yonli
2023Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets.
Brian Lewandowski
2023Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives.
Mark Dockendorf, Ram Dantu
2023How to Plausibly Deny Steganographic Secrets.
Shahzad Ahmad, Stefan Rass
2023IMAGINE Dataset: Digital Camera Identification Image Benchmarking Dataset.
Jaroslaw Bernacki, Rafal Scherer
2023Improvement of Winternitz OTS with a Novel Fingerprinting Function.
Motonari Honda, Yuichi Kaji
2023Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized Approaches.
Amani Bacha, Farah Barika Ktata, Faten Louati
2023Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach.
Md. Al Amin, Amani Altarawneh, Indrajit Ray
2023International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed "Hakoniwa".
Satoshi Kai, Takao Kondo, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka
2023JShelter: Give Me My Browser Back.
Libor Polcák, Marek Salon, Giorgio Maone, Radek Hranický, Michael McMahon
2023K-Anonymous Privacy Preserving Manifold Learning.
Sonakshi Garg, Vicenç Torra
2023Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models.
Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Luca Piras, Andrei Petrovski
2023Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code.
Patrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl
2023Lattice-Based Threshold Signature Implementation for Constrained Devices.
Patrik Dobias, Sara Ricci, Petr Dzurenda, Lukas Malina, Nikita Snetkov
2023Lessons Learned: Defending Against Property Inference Attacks.
Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath
2023Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid.
Arne Roar Nygård, Sokratis K. Katsikas
2023Light Quantum Key Distribution Network Security Estimation Tool.
Sara Nikula, Pekka Koskela, Outi-Marja Latvala, Sami Lehtonen
2023Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys.
Marina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga
2023MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware.
David Schrammel, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, Stefan Mangard
2023Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement.
Alexandre Augusto Giron
2023Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning.
Myria Bouhaddi, Kamel Adi
2023OCScraper: Automated Analysis of the Fingerprintability of the iOS API.
Gerald Palfinger
2023On Single-Server Delegation Without Precomputation.
Matluba Khodjaeva, Giovanni Di Crescenzo
2023On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data.
Zeynep Sila Kaya, Mehmet Emre Gursoy
2023On the Implementation of a Lattice-Based Revocable Hierarchical Ibe.
Mikael Carmona, Doryan Lesaignoux, Antoine Loiseau
2023On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication.
Mustapha Benssalah, Karim Drouiche
2023One to Bind Them: Binding Verifiable Credentials to User Attributes.
Alexander Mühle, Katja Assaf, Christoph Meinel
2023Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures.
Alexandru Ionita
2023PIUDI: Private Information Update for Distributed Infrastructure.
Shubham Raj, Snehil Joshi, Kannan Srinathan
2023Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks.
Kayode S. Adewole, Vicenç Torra
2023Privacy in Practice: Private COVID-19 Detection in X-Ray Images.
Lucas Lange, Maja Schneider, Peter Christen, Erhard Rahm
2023Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs.
Mark Dockendorf, Ram Dantu
2023Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023.
Sabrina De Capitani di Vimercati, Pierangela Samarati
2023Proctoring Online Exam Using Eye Tracking.
Waheeb Yaqub, Manoranjan Mohanty, Basem Suleiman
2023RSSI-Based Fingerprinting of Bluetooth Low Energy Devices.
Guillaume Gagnon, Sébastien Gambs, Mathieu Cunche
2023Receipt-Free Electronic Voting from zk-SNARK.
Maryam Sheikhi, Rosario Giustolisi, Carsten Schürmann
2023Regulating Cyber Incidents: A Review of Recent Reporting Requirements.
Angelica Marotta, Stuart E. Madnick
2023Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis.
Kazutaka Matsuzaki, Kenji Sawada, Shinichi Honiden
2023Risk-Based Illegal Information Flow Detection in the IIoT.
Argiro Anagnostopoulou, Ioannis Mavridis, Dimitris Gritzalis
2023Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices.
Arijit Karati, Yu-Sheng Chang, Ting-Yu Chen
2023SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme.
Sehrish Shafeeq, Mathias Fischer
2023SQLi Detection with ML: A Data-Source Perspective.
Balázs Pejó, Nikolett Kapui
2023Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries.
Catalin V. Bîrjoveanu, Mirela Bîrjoveanu
2023Security for Distributed Machine Learning.
Laurent Gomez, Tianchi Yu, Patrick Duverger
2023Security for Next-Gen Analytics for Cross-Organisation Collaboration.
Laurent Gomez, Francesco Capano, Patrick Duverger
2023Self-Sovereign Identity (SSI) Attribute-Based Web Authentication.
Biagio Boi, Marco De Santis, Christian Esposito
2023Smart Bulbs Can Be Hacked to Hack into Your Household.
Davide Bonaventura, Sergio Esposito, Giampaolo Bella
2023Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems.
Roland Czerny, Christian Kollmann, Blaz Podgorelec, Bernd Prünster, Thomas Zefferer
2023SoK: Towards CCA Secure Fully Homomorphic Encryption.
Hiroki Okada, Kazuhide Fukushima
2023The Certification Panacea.
Rigo Wenning
2023The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis.
Wisam Abbasi, Paolo Mori, Andrea Saracino
2023Threshold Cryptosystems Based on 2^k-th Power Residue Symbols.
George Teseleanu
2023Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility.
Dario Castellano, Roberto De Prisco, Pompeo Faruolo
2023Towards Usable Scoring of Common Weaknesses.
Olutola Adebiyi, Massimiliano Albanese
2023Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks.
Rocco Zaccagnino, Antonio Cirillo, Alfonso Guarino, Nicola Lettieri, Delfina Malandrino, Gianluca Zaccagnino
2023Trans-IDS: A Transformer-Based Intrusion Detection System.
El Mahdi Mercha, El Mostapha Chakir, Mohammed Erradi
2023Unclonable Cryptography: A Tale of Two No-Cloning Paradigms.
Ghada Almashaqbeh, Rohit Chatterjee
2023Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques.
Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda
2023Using Untrusted and Unreliable Cloud Providers to Obtain Private Email.
Nicolas Chiapputo, Yvo Desmedt, Kirill Morozov
2023VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations.
Quentin L. Meunier, Abdul Rahman Taleb
2023Virtual Private Networks in the Quantum Era: A Security in Depth Approach.
David Schatz, Friedrich Altheide, Hedwig Koerfgen, Michael Rossberg, Guenter Schaefer
2023WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers.
Pascal Wichmann, Sam Ansari, Hannes Federrath, Jens Lindemann
2023When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning.
Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, Dimos Mellios, Damian A. Tamburri
2023XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement.
Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng
2023ZT-NIDS: Zero Trust, Network Intrusion Detection System.
Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He
2023Δ SFL: (Decoupled Server Federated Learning) to Utilize DLG Attacks in Federated Learning by Decoupling the Server.
Sudipta Paul, Vicenç Torra