SECRYPT C

99 papers

YearTitle / Authors
2024A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks.
Peter Amthor, René Gorges
2024A Formal Analysis of CIE Level 2 Multi-Factor Authentication via SMS OTP.
Roberto van Eeden, Matteo Paier, Marino Miculan
2024A Framework for Federated Analysis of Health Data Using Multiparty Homomorphic Encryption.
Miroslav Puskaric
2024A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC.
Ridwane Aissaoui, Jean-Christophe Deneuville, Christophe Guerber, Alain Pirovano
2024A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs.
Mahdi Akil, Leonardo A. Martucci, Jaap-Henk Hoepman
2024A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated Learning.
Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux
2024Amun: Securing E-Voting Against Over-the-Shoulder Coercion.
Riccardo Longo, Chiara Spadafora
2024An ASM-Based Approach for Security Assessment of Ethereum Smart Contracts.
Chiara Braghin, Elvinia Riccobene, Simone Valentini
2024An Efficient Hash Function Construction for Sparse Data.
Nir Soffer, Erez Waisbard
2024An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing.
Benjamin Aziz, Estabraq H. Makiyah, Aysha Bukhelli
2024An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection.
Harpreet Singh, Habib Louafi, Yiyu Yao
2024Artificial Intelligence for Biometrics.
Vincenzo Piuri
2024Attribute Threat Analysis and Risk Assessment for ABAC and TBAC Systems.
Leonard Bradatsch, Artur Hermann, Frank Kargl
2024Autoencoder for Detecting Malicious Updates in Differentially Private Federated Learning.
Lucía Alonso, Mina Alishahi
2024Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints.
Riccardo Germenia, Salvatore Manfredi, Matteo Rizzi, Giada Sciarretta, Alessandro Tomasi, Silvio Ranise
2024Backdoor Attacks During Retraining of Machine Learning Models: A Mitigation Approach.
Matthew Yudin, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov
2024Balancing Act: Navigating the Privacy-Utility Spectrum in Principal Component Analysis.
Saloni Kwatra, Anna Monreale, Francesca Naretto
2024Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing.
Md. Al Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray
2024Black Sheep Wall: Towards Multiple Vantage Point-Based Information Space Situational Awareness.
Bernhards Blumbergs
2024BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices.
Poonam Namdeo Shelke, Saurav Gupta, Sukumar Nandi
2024Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly.
Emmanuele Massidda, Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto
2024CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions.
Massimiliano Albanese, Olutola Adebiyi, Frank Onovae
2024Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses.
Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier
2024Characterization of Consensus Correctness in Ripple (XRP) Networks.
Rudrapatna K. Shyamasundar
2024Classifying Human-Generated and AI-Generated Election Claims in Social Media.
Alphaeus Dmonte, Marcos Zampieri, Kevin Lybarger, Massimiliano Albanese, Genya Coulter
2024Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations.
Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart, Edgar R. Weippl
2024Compact Representation of Digital Camera's Fingerprint with Convolutional Autoencoder.
Jaroslaw Bernacki, Rafal Scherer
2024Comparison of Access Control Approaches for Graph-Structured Data.
Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng
2024DISC: A Dataset for Information Security Classification.
Elijah Bass, Massimiliano Albanese, Marcos Zampieri
2024DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active Learning.
Helene Orsini, Yufei Han
2024Do You Trust Your Device? Open Challenges in IoT Security Analysis.
Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca
2024Dvorak: A Browser Credential Dumping Malware.
José Areia, Bruno Santos, Mário Antunes
2024Encrypted KNN Implementation on Distributed Edge Device Network.
B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee
2024Enhancing Adversarial Defense in Behavioral Authentication Systems Through Random Projections.
Md. Morshedul Islam, Md. Khairul Anam
2024Enhancing OpenID Connect for Verifiable Credentials with DIDComm.
Roberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo
2024Enhancing Privacy and Utility in Federated Learning: A Hybrid P2P and Server-Based Approach with Differential Privacy Protection.
Luca Corbucci, Anna Monreale, Roberto Pellungrini
2024Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks.
Myria Bouhaddi, Kamel Adi
2024Evaluating Digital Forensic Readiness: A Honeypot Approach.
Philip Zimmermann, Sebastian Obermeier
2024Explainability and Privacy-Preserving Data-Driven Models.
Vicenç Torra
2024FPGA Implementation of AES-Based on Optimized Dynamic s-Box.
Calvo Mayaudón Haroldo, Nakojah Chris David, Mahdi Madani, El-Bay Bourennane
2024Formal Analysis of C-ITS PKI Protocols.
Mounira Msahli, Pascal Lafourcade, Dhekra Mahmoud
2024From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems.
Argiro Anagnostopoulou, Thomas Papaloukas, George Stergiopoulos, Dimitris Gritzalis
2024Fuzzy Vault Security Enhancement Avoid Statistical Biases.
Sara Majbour, Morgan Barbier, Jean-Marie Le Bars
2024GAN-based Seed Generation for Efficient Fuzzing.
Shyamili Toluchuri, Aishwarya Upadhyay, Smita Naval, Vijay Laxmi, Manoj Singh Gaur
2024Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers.
Eric Filiol, Pierre Filiol
2024High-Speed Pipelined FPGA Implementation of a Robust Steganographic Scheme for Secure Data Communication Systems.
Salah S. Harb, M. Omair Ahmad, M. N. S. Swamy
2024Higher Order Leakage Assessment and Neural Network-based Attack on CRYSTALS-Kyber.
Buvana Ganesh, Mosabbah Mushir Ahmed, Alieeldin Mady
2024HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education.
Sebastian Obermeier, Giorgio Tresoldi, Bernhard Tellenbach, Vincent Lenders
2024Imperceptible QR Watermarks in High-Resolution Videos.
Tymoteusz Lindner, Tomasz Hawro, Piotr Syga
2024Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs.
Arka Ghosh, Massimiliano Albanese, Preetam Mukherjee, Amir Alipour-Fanid
2024InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace Files.
Jesús E. Díaz Verdejo, Javier Muñoz-Calle, Rafael M. Estepa-Alonso, Antonio Estepa Alonso
2024K-Resilient Public Key Authenticated Encryption with Keyword Search.
Koon-Ming Chan, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan
2024Kex-Filtering: A Proactive Approach to Filtering.
Fabrizio Baiardi, Filippo Boni, Giovanni Braccini, Emanuele Briganti, Luca Deri
2024LAMA: Leakage Abuse Attacks Against Microsoft Always Encrypted.
Ryan Seah, Daren Khu, Alexander Hoover, Ruth Ng
2024Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of SQL Concatenations.
Kevin Dennis, Bianca Dehaan, Parisa Momeni, Gabriel Laverghetta, Jay Ligatti
2024Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data.
Amine Hattak, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2024Lightweight Cryptographic Algorithms: A Position Paper.
Gabriela Mendes Corrêa de Miranda, José Antônio Moreira Xexéo, Renato Hidaka Torres
2024Linkage Between CVE and ATT&CK with Public Information.
Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka
2024Local Differential Privacy for Data Clustering.
Lisa Bruder, Mina Alishahi
2024MATRaCAE: Time-Based Revocable Access Control in the IoT.
Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst
2024Malware Analysis Using Transformer Based Models: An Empirical Study.
Abhishek Joshi, Divyateja Pasupuleti, P. Nischith, Sarvesh Sutaone, Soumil Ray, Soumyadeep Dey, Barsha Mitra
2024Manipulating Prompts and Retrieval-Augmented Generation for LLM Service Providers.
Aditya Kuppa, Jack Nicholls, Nhien-An Le-Khac
2024Membership Inference Attacks Against Indoor Location Models.
Vahideh Moghtadaiee, Amir Fathalizadeh, Mina Alishahi
2024MultiVD: A Transformer-based Multitask Approach for Software Vulnerability Detection.
Claudio Curto, Daniela Giordano, Simone Palazzo, Daniel Gustav Indelicato
2024OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect.
Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi
2024On Privacy of RFID-Based Authentication Protocols.
Ferucio Laurentiu Tiplea
2024On the Implementation of a Lattice-Based DAA for Vanet System.
Doryan Lesaignoux, Mikael Carmona
2024On the Privacy Afforded by Opaque Identifiers in Traffic Monitoring.
Marcus Gelderie
2024Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment.
Petr Tuma, Jan Hajny, Petr Muzikant, Jan Havlin, Lukas Malina, Patrik Dobias, Jan Willemson
2024Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption.
Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki
2024Perception of Privacy Tools for Social Media: A Qualitative Analysis Among Japanese.
Vanessa Bracamonte, Yohko Orito, Yasunori Fukuta, Kiyoshi Murata, Takamasa Isohara
2024Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation.
Fatema Rashid, Ali Miri
2024Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024, Dijon, France, July 8-10, 2024.
Sabrina De Capitani di Vimercati, Pierangela Samarati
2024Property Inference as a Regression Problem: Attacks and Defense.
Joshua Stock, Lucas Lange, Erhard Rahm, Hannes Federrath
2024QPTA: Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight Devices.
Basker Palaniswamy, Arijit Karati
2024QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks.
Arijit Karati, Ting-Yu Chen, Kai-Yao Lin
2024Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous Agreement.
Syed Badruddoja, Ram Dantu, Mark Dockendorf, Abiola Salau, Kritagya Upadhyay
2024SCWAD: Automated Pentesting of Web Applications.
Natan Talon, Valérie Viet Triem Tong, Gilles Guette, Yufei Han, Youssef Laarouchi
2024Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping.
Sebastian Schrittwieser, Andreas Ekelhart, Esther Seidl, Edgar R. Weippl
2024Secure Multi-Party Traversal Queries over Federated Graph Databases.
Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe
2024Securing Patient Data in IoT Devices: A Blockchain-NFT Approach for Privacy, Security, and Authentication.
Farha Masroor, Adarsh Gopalakrishnan, Neena Goveas
2024Security Analysis for BB84 Key Distillation.
Sara Nikula, Anssi Lintulampi, Kimmo Halunen
2024Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes.
Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier
2024Solving Access Control Conflicts in Multi-User Systems.
Alba Martinez Anton, Clara Bertolissi, Jean-Marc Talbot
2024Spellchecker Analysis for Behavioural Biometric of Typing Errors Scenario.
Bartlomiej Marek, Wojciech Wodo
2024TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in Cybersecurity.
Inoussa Mouiche, Sherif Saad
2024The IoT Breaches Your Household Again.
Davide Bonaventura, Sergio Esposito, Giampaolo Bella
2024The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries.
Calebe Helpa, Tiago Heinrich, Marcus Botacin, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero
2024Toward the Foundation of Digital Identity Theory.
Pierre Fobougong Saha, Mohamed Mejri, Kamel Adi
2024Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLID.
Alfredo Cuzzocrea, Islam Belmerabet
2024Towards a Cryptographic Model for Wireless Communication.
Frederik Armknecht, Christian Müller
2024Towards a Secure and Intelligent Access Control Policy Adapter for Big Data Environment.
El Mostapha Chakir, Marouane Hachimi, Mohammed Erradi
2024Towards an Adaptive Trust Management Model Based on ANFIS in the SIoT.
Hamdi Ouechtati, Nadia Ben Azzouna
2024UPCARE: User Privacy-Preserving Cancer Research Platform.
Georg Bramm, Melek Önen, Martin Schanzenbach, Ilya Komarov, Frank Morgner, Christian Tiebel, Juan Cadavid
2024Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures.
George Stergiopoulos, Michalis Detsis, Sozon Leventopoulos, Dimitris Gritzalis
2024Verifying Artifact Authenticity with Unclonable Optical Tags.
Mónica P. Arenas, Gabriele Lenzini, Mohammadamin Rakeei, Peter Y. A. Ryan, Marjan Skrobot, Maria Zhekova
2024Violence Detection: A Serious-Gaming Approach.
Derkjan Elzinga, Stan Ruessink, Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel
2024Virtually Free Randomisations of NTT in RLWE Cryptosystem to Counteract Side Channel Attack Based on Belief Propagation.
Christophe Nègre, Mbaye Ngom
2024chiku: Efficient Probabilistic Polynomial Approximations Library.
Devharsh Trivedi, Nesrine Kaaniche, Aymen Boudguiga, Nikos Triandopoulos