| 2024 | A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks. Peter Amthor, René Gorges |
| 2024 | A Formal Analysis of CIE Level 2 Multi-Factor Authentication via SMS OTP. Roberto van Eeden, Matteo Paier, Marino Miculan |
| 2024 | A Framework for Federated Analysis of Health Data Using Multiparty Homomorphic Encryption. Miroslav Puskaric |
| 2024 | A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC. Ridwane Aissaoui, Jean-Christophe Deneuville, Christophe Guerber, Alain Pirovano |
| 2024 | A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs. Mahdi Akil, Leonardo A. Martucci, Jaap-Henk Hoepman |
| 2024 | A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated Learning. Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux |
| 2024 | Amun: Securing E-Voting Against Over-the-Shoulder Coercion. Riccardo Longo, Chiara Spadafora |
| 2024 | An ASM-Based Approach for Security Assessment of Ethereum Smart Contracts. Chiara Braghin, Elvinia Riccobene, Simone Valentini |
| 2024 | An Efficient Hash Function Construction for Sparse Data. Nir Soffer, Erez Waisbard |
| 2024 | An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing. Benjamin Aziz, Estabraq H. Makiyah, Aysha Bukhelli |
| 2024 | An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection. Harpreet Singh, Habib Louafi, Yiyu Yao |
| 2024 | Artificial Intelligence for Biometrics. Vincenzo Piuri |
| 2024 | Attribute Threat Analysis and Risk Assessment for ABAC and TBAC Systems. Leonard Bradatsch, Artur Hermann, Frank Kargl |
| 2024 | Autoencoder for Detecting Malicious Updates in Differentially Private Federated Learning. Lucía Alonso, Mina Alishahi |
| 2024 | Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints. Riccardo Germenia, Salvatore Manfredi, Matteo Rizzi, Giada Sciarretta, Alessandro Tomasi, Silvio Ranise |
| 2024 | Backdoor Attacks During Retraining of Machine Learning Models: A Mitigation Approach. Matthew Yudin, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov |
| 2024 | Balancing Act: Navigating the Privacy-Utility Spectrum in Principal Component Analysis. Saloni Kwatra, Anna Monreale, Francesca Naretto |
| 2024 | Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing. Md. Al Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray |
| 2024 | Black Sheep Wall: Towards Multiple Vantage Point-Based Information Space Situational Awareness. Bernhards Blumbergs |
| 2024 | BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices. Poonam Namdeo Shelke, Saurav Gupta, Sukumar Nandi |
| 2024 | Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly. Emmanuele Massidda, Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto |
| 2024 | CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions. Massimiliano Albanese, Olutola Adebiyi, Frank Onovae |
| 2024 | Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses. Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier |
| 2024 | Characterization of Consensus Correctness in Ripple (XRP) Networks. Rudrapatna K. Shyamasundar |
| 2024 | Classifying Human-Generated and AI-Generated Election Claims in Social Media. Alphaeus Dmonte, Marcos Zampieri, Kevin Lybarger, Massimiliano Albanese, Genya Coulter |
| 2024 | Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations. Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart, Edgar R. Weippl |
| 2024 | Compact Representation of Digital Camera's Fingerprint with Convolutional Autoencoder. Jaroslaw Bernacki, Rafal Scherer |
| 2024 | Comparison of Access Control Approaches for Graph-Structured Data. Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng |
| 2024 | DISC: A Dataset for Information Security Classification. Elijah Bass, Massimiliano Albanese, Marcos Zampieri |
| 2024 | DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active Learning. Helene Orsini, Yufei Han |
| 2024 | Do You Trust Your Device? Open Challenges in IoT Security Analysis. Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca |
| 2024 | Dvorak: A Browser Credential Dumping Malware. José Areia, Bruno Santos, Mário Antunes |
| 2024 | Encrypted KNN Implementation on Distributed Edge Device Network. B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee |
| 2024 | Enhancing Adversarial Defense in Behavioral Authentication Systems Through Random Projections. Md. Morshedul Islam, Md. Khairul Anam |
| 2024 | Enhancing OpenID Connect for Verifiable Credentials with DIDComm. Roberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo |
| 2024 | Enhancing Privacy and Utility in Federated Learning: A Hybrid P2P and Server-Based Approach with Differential Privacy Protection. Luca Corbucci, Anna Monreale, Roberto Pellungrini |
| 2024 | Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks. Myria Bouhaddi, Kamel Adi |
| 2024 | Evaluating Digital Forensic Readiness: A Honeypot Approach. Philip Zimmermann, Sebastian Obermeier |
| 2024 | Explainability and Privacy-Preserving Data-Driven Models. Vicenç Torra |
| 2024 | FPGA Implementation of AES-Based on Optimized Dynamic s-Box. Calvo Mayaudón Haroldo, Nakojah Chris David, Mahdi Madani, El-Bay Bourennane |
| 2024 | Formal Analysis of C-ITS PKI Protocols. Mounira Msahli, Pascal Lafourcade, Dhekra Mahmoud |
| 2024 | From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems. Argiro Anagnostopoulou, Thomas Papaloukas, George Stergiopoulos, Dimitris Gritzalis |
| 2024 | Fuzzy Vault Security Enhancement Avoid Statistical Biases. Sara Majbour, Morgan Barbier, Jean-Marie Le Bars |
| 2024 | GAN-based Seed Generation for Efficient Fuzzing. Shyamili Toluchuri, Aishwarya Upadhyay, Smita Naval, Vijay Laxmi, Manoj Singh Gaur |
| 2024 | Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers. Eric Filiol, Pierre Filiol |
| 2024 | High-Speed Pipelined FPGA Implementation of a Robust Steganographic Scheme for Secure Data Communication Systems. Salah S. Harb, M. Omair Ahmad, M. N. S. Swamy |
| 2024 | Higher Order Leakage Assessment and Neural Network-based Attack on CRYSTALS-Kyber. Buvana Ganesh, Mosabbah Mushir Ahmed, Alieeldin Mady |
| 2024 | HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education. Sebastian Obermeier, Giorgio Tresoldi, Bernhard Tellenbach, Vincent Lenders |
| 2024 | Imperceptible QR Watermarks in High-Resolution Videos. Tymoteusz Lindner, Tomasz Hawro, Piotr Syga |
| 2024 | Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs. Arka Ghosh, Massimiliano Albanese, Preetam Mukherjee, Amir Alipour-Fanid |
| 2024 | InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace Files. Jesús E. Díaz Verdejo, Javier Muñoz-Calle, Rafael M. Estepa-Alonso, Antonio Estepa Alonso |
| 2024 | K-Resilient Public Key Authenticated Encryption with Keyword Search. Koon-Ming Chan, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan |
| 2024 | Kex-Filtering: A Proactive Approach to Filtering. Fabrizio Baiardi, Filippo Boni, Giovanni Braccini, Emanuele Briganti, Luca Deri |
| 2024 | LAMA: Leakage Abuse Attacks Against Microsoft Always Encrypted. Ryan Seah, Daren Khu, Alexander Hoover, Ruth Ng |
| 2024 | Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of SQL Concatenations. Kevin Dennis, Bianca Dehaan, Parisa Momeni, Gabriel Laverghetta, Jay Ligatti |
| 2024 | Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data. Amine Hattak, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2024 | Lightweight Cryptographic Algorithms: A Position Paper. Gabriela Mendes Corrêa de Miranda, José Antônio Moreira Xexéo, Renato Hidaka Torres |
| 2024 | Linkage Between CVE and ATT&CK with Public Information. Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka |
| 2024 | Local Differential Privacy for Data Clustering. Lisa Bruder, Mina Alishahi |
| 2024 | MATRaCAE: Time-Based Revocable Access Control in the IoT. Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst |
| 2024 | Malware Analysis Using Transformer Based Models: An Empirical Study. Abhishek Joshi, Divyateja Pasupuleti, P. Nischith, Sarvesh Sutaone, Soumil Ray, Soumyadeep Dey, Barsha Mitra |
| 2024 | Manipulating Prompts and Retrieval-Augmented Generation for LLM Service Providers. Aditya Kuppa, Jack Nicholls, Nhien-An Le-Khac |
| 2024 | Membership Inference Attacks Against Indoor Location Models. Vahideh Moghtadaiee, Amir Fathalizadeh, Mina Alishahi |
| 2024 | MultiVD: A Transformer-based Multitask Approach for Software Vulnerability Detection. Claudio Curto, Daniela Giordano, Simone Palazzo, Daniel Gustav Indelicato |
| 2024 | OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect. Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi |
| 2024 | On Privacy of RFID-Based Authentication Protocols. Ferucio Laurentiu Tiplea |
| 2024 | On the Implementation of a Lattice-Based DAA for Vanet System. Doryan Lesaignoux, Mikael Carmona |
| 2024 | On the Privacy Afforded by Opaque Identifiers in Traffic Monitoring. Marcus Gelderie |
| 2024 | Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment. Petr Tuma, Jan Hajny, Petr Muzikant, Jan Havlin, Lukas Malina, Patrik Dobias, Jan Willemson |
| 2024 | Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki |
| 2024 | Perception of Privacy Tools for Social Media: A Qualitative Analysis Among Japanese. Vanessa Bracamonte, Yohko Orito, Yasunori Fukuta, Kiyoshi Murata, Takamasa Isohara |
| 2024 | Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation. Fatema Rashid, Ali Miri |
| 2024 | Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024, Dijon, France, July 8-10, 2024. Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2024 | Property Inference as a Regression Problem: Attacks and Defense. Joshua Stock, Lucas Lange, Erhard Rahm, Hannes Federrath |
| 2024 | QPTA: Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight Devices. Basker Palaniswamy, Arijit Karati |
| 2024 | QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks. Arijit Karati, Ting-Yu Chen, Kai-Yao Lin |
| 2024 | Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous Agreement. Syed Badruddoja, Ram Dantu, Mark Dockendorf, Abiola Salau, Kritagya Upadhyay |
| 2024 | SCWAD: Automated Pentesting of Web Applications. Natan Talon, Valérie Viet Triem Tong, Gilles Guette, Yufei Han, Youssef Laarouchi |
| 2024 | Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping. Sebastian Schrittwieser, Andreas Ekelhart, Esther Seidl, Edgar R. Weippl |
| 2024 | Secure Multi-Party Traversal Queries over Federated Graph Databases. Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe |
| 2024 | Securing Patient Data in IoT Devices: A Blockchain-NFT Approach for Privacy, Security, and Authentication. Farha Masroor, Adarsh Gopalakrishnan, Neena Goveas |
| 2024 | Security Analysis for BB84 Key Distillation. Sara Nikula, Anssi Lintulampi, Kimmo Halunen |
| 2024 | Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes. Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier |
| 2024 | Solving Access Control Conflicts in Multi-User Systems. Alba Martinez Anton, Clara Bertolissi, Jean-Marc Talbot |
| 2024 | Spellchecker Analysis for Behavioural Biometric of Typing Errors Scenario. Bartlomiej Marek, Wojciech Wodo |
| 2024 | TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in Cybersecurity. Inoussa Mouiche, Sherif Saad |
| 2024 | The IoT Breaches Your Household Again. Davide Bonaventura, Sergio Esposito, Giampaolo Bella |
| 2024 | The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries. Calebe Helpa, Tiago Heinrich, Marcus Botacin, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero |
| 2024 | Toward the Foundation of Digital Identity Theory. Pierre Fobougong Saha, Mohamed Mejri, Kamel Adi |
| 2024 | Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLID. Alfredo Cuzzocrea, Islam Belmerabet |
| 2024 | Towards a Cryptographic Model for Wireless Communication. Frederik Armknecht, Christian Müller |
| 2024 | Towards a Secure and Intelligent Access Control Policy Adapter for Big Data Environment. El Mostapha Chakir, Marouane Hachimi, Mohammed Erradi |
| 2024 | Towards an Adaptive Trust Management Model Based on ANFIS in the SIoT. Hamdi Ouechtati, Nadia Ben Azzouna |
| 2024 | UPCARE: User Privacy-Preserving Cancer Research Platform. Georg Bramm, Melek Önen, Martin Schanzenbach, Ilya Komarov, Frank Morgner, Christian Tiebel, Juan Cadavid |
| 2024 | Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures. George Stergiopoulos, Michalis Detsis, Sozon Leventopoulos, Dimitris Gritzalis |
| 2024 | Verifying Artifact Authenticity with Unclonable Optical Tags. Mónica P. Arenas, Gabriele Lenzini, Mohammadamin Rakeei, Peter Y. A. Ryan, Marjan Skrobot, Maria Zhekova |
| 2024 | Violence Detection: A Serious-Gaming Approach. Derkjan Elzinga, Stan Ruessink, Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel |
| 2024 | Virtually Free Randomisations of NTT in RLWE Cryptosystem to Counteract Side Channel Attack Based on Belief Propagation. Christophe Nègre, Mbaye Ngom |
| 2024 | chiku: Efficient Probabilistic Polynomial Approximations Library. Devharsh Trivedi, Nesrine Kaaniche, Aymen Boudguiga, Nikos Triandopoulos |