SECRYPT C

86 papers

YearTitle / Authors
2025A Fragile Watermarking Technique for Integrity Authentication of CSV-Files Using Invisible Line-Ending Control Characters.
Florian Zimmer, Malte Hellmeier, Motoki Nakamura, Tobias Urbanek
2025A Hybrid Approach to Improve the Intrusion Detection Systems Using Generative Artificial Intelligence and Deep Reinforcement Learning.
Ines Ben Makhlouf, Ghassen Kilani, Fehmi Jaafar, Haïfa Nakouri
2025A Hybrid-Based Transfer Learning Approach for IoT Device Identification.
Stephanie M. Opoku, Habib Louafi, Malek Mouhoub
2025A Method for Packed (and Unpacked) Malware Detection by Means of Convolutional Neural Networks.
Giovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo
2025A Mobile Payment Scheme Using Biometric Identification with Mutual Authentication.
Jack Sturgess, Ivan Martinovic
2025A Multi-Model Approach to Enhance Automatic Matching of Vulnerabilities to Attack Patterns.
Marine Sauze-Kadar, Thomas Loubier
2025A Resilient Randomization Technique Against ML-Driven Timing Side Channel Attack on Mobile Location.
Abdeslam El-Yahyaoui, Mohammed Erradi
2025A Safety-Centric Analysis and Benchmarks of Modern Open-Source Homomorphic Encryption Libraries.
Nges Brian Njungle, Milan Stojkov, Michel A. Kinsy
2025AI-Based Anomaly Detection and Classification of Traffic Using Netflow.
Gustavo Gonzalez Granadillo, Nesrine Kaaniche
2025Accelerating PEGASUS by Applying NTRU-Based GSW-Like Encryption.
Shusaku Uemura, Kazuhide Fukushima
2025Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security.
Emilia Rivas, Sabrina Saika, Ahtesham Bakht, Aritran Piplai, Nathaniel D. Bastian, Ankit Shah
2025Addressing the C/C++ Vulnerability Datasets Limitation: The Good, the Bad and the Ugly.
Claudio Curto, Daniela Giordano, Daniel Gustav Indelicato
2025An ETSI GS QKD Compliant TLS Implementation.
Thomas Prévost, Bruno Martin, Olivier Alibart
2025An Enhanced Two-Step CPA Side-Channel Analysis Attack on ML-KEM.
Mark Kennaway, Anh-Tuan Hoang, Ayesha Khalid, Ciara Rafferty, Máire O'Neill
2025An NLP-Based Framework Leveraging Email and Multimodal User Data.
Neda Baghalizadeh-Moghadam, Frédéric Cuppens, Nora Boulahia-Cuppens
2025Anomaly Detection in ZkSync Transactions with Unsupervised Machine Learning.
Kamil Kaczynski, Aleksander Wiacek
2025Assessing Security RISC: Analyzing Flush+Fault Attack on RISC-V Using gem5 Simulator.
Mahreen Khan, Maria Mushtaq, Renaud Pacalet, Ludovic Apvrille
2025Beyond Rules: How Large Language Models Are Redefining Cryptographic Misuse Detection.
Zohaib Masood, Miguel Vargas Martin
2025Blockchain-Based Multi-Signature System for Critical Scenarios.
Cristina Alcaraz, Davide Ferraris, Hector Guzman, Javier López
2025Bolstering IIoT Resilience: The Synergy of Blockchain and CapBAC.
Argiro Anagnostopoulou, Eleni Kehrioti, Ioannis Mavridis, Dimitris Gritzalis
2025Can Contributing More Put You at a Higher Leakage Risk? The Relationship Between Shapley Value and Training Data Leakage Risks in Federated Learning.
Soumia Zohra El Mestari, Maciej Krzysztof Zuziak, Gabriele Lenzini, Salvatore Rinzivillo
2025Comparison of Credential Status Mechanisms for the Digital Wallet Ecosystem.
Riccardo Germenia, Salvatore Manfredi, Giada Sciarretta, Mario Scuro, Alessandro Tomasi
2025Control Flow Protection by Cryptographic Instruction Chaining.
Shahzad Ahmad, Stefan Rass, Maksim Goman, Manfred Schlägl, Daniel Große
2025Correlation Power Analysis on Ascon with Multi-Bit Selection Function.
Viet Sang Nguyen, Vincent Grosso, Pierre-Louis Cayrel
2025Dataset Watermarking Using the Discrete Wavelet Transform.
Mike P. Raave, Devris Isler, Zekeriya Erkin
2025Did You Break the Glass Properly? A Policy Compliance Framework for Protected Health Information (PHI) Emergency Access.
Md. Al Amin, Rushabh Shah, Hemanth Tummala, Indrajit Ray
2025EDQKD: Enhanced-Dynamic Quantum Key Distributions with Improved Security and Key Rate.
Nikhil Kumar Parida, Sarath Babu, Neeraj Panwar, Virendra Singh
2025EdgeFuzz: A Middleware-Based Security Testing Tool for Vulnerability Discovery in Distributed Computing Applications.
Mishaal Ahmed, Muhammad Ajmal Naz
2025Efficient Post-Processing of Intrusion Detection Alerts Using Data Mining and Clustering.
Kalu Gamage Kavindu Induwara Kumarasinghe, Ilangan Pakshage Madhawi Pathum Kumarsiri, Harsha Sandaruwan Gardiyawasam Pussewalage, Kapuruka Abarana Gedara Thihara Vilochana Kumarasinghe, Kushan Sudheera Kalupahana Liyanage, Yahani Pinsara Manawadu, Haran Mamankaran
2025Empirical Evaluation of Memory-Erasure Protocols.
Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua
2025Enhancing Access Control in Distributed Systems Through Intelligent ABAC Policy Mining.
Sudhir Kumar Bai, Jason Aaron Goveas, Barsha Mitra
2025Enhancing Anonymity for Electric Vehicles in the ISO 15118 Plug-and-Charge.
Nethmi Hettiarachchi, Kalikinkar Mandal, Saqib Hakak
2025Enhancing National Digital Identity Systems: A Framework for Institutional and Technical Harm Prevention Inspired by Microsoft's Harms Modeling.
Giovanni Corti, Gianluca Sassetti, Amir Sharif, Roberto Carbone, Silvio Ranise
2025Evaluating a Bimodal User Verification Robustness Against Synthetic Data Attacks.
Sandeep Gupta, Rajesh Kumar, Kiran B. Raja, Bruno Crispo, Carsten Maple
2025Evasive IPv6 Covert Channels: Design, Machine Learning Detection, and Explainable AI Evaluation.
Viet Anh Phan, Jan Jerabek
2025Extending Null Embedding for Deep Neural Network (DNN) Watermarking.
Kaan Altinay, Devris Isler, Zekeriya Erkin
2025From Real to Synthetic: GAN and DPGAN for Privacy Preserving Classifications.
Mohammad Emadi, Vahideh Moghtadaiee, Mina Alishahi
2025FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm.
Shokofeh VahidianSadegh, Alberto Ibarrondo, Lena Wiese
2025Hierarchical Colored Petri Nets for Vulnerability Detection in Software Architectures.
Maya Benabdelhafid, Kamel Adi, Omer Landry Nguena-Timo, Luigi Logrippo
2025Highlighting Vulnerabilities in a Genomics Biocybersecurity Lab Through Threat Modeling and Security Testing.
Jared Sheldon, Isabelle Brown-Cantrell, Patrick Pape, Thomas H. Morris
2025Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability.
Tianxiang Dai, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp
2025How to Design a Public Key Infrastructure for a Central Bank Digital Currency.
Makan Rafiee, Lars Hupel
2025I Know What You Bought Last Summer: Investigating User Data Leakage in E-Commerce Platforms.
Ioannis Vlachogiannakis, Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos
2025Insider Threats and Countermeasures Based on AI Lie Detection.
Konstantinos Kalodanis, Panagiotis Rizomiliotis, Charalampos Papapavlou, Apostolos Skrekas, Stavros Papadimas, Dimosthenis Anagnostopoulos
2025Large Language Models as Carriers of Hidden Messages.
Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki
2025Learning Personalized and Context-Aware Violation Detection Rules in Trigger-Action Apps.
Mahsa Saeidi, Sai Sree Laya Chukkapalli, Anita Sarma, Rakesh B. Bobba
2025Learning Without Sharing: A Comparative Study of Federated Learning Models for Healthcare.
Anja Campmans, Mina Alishahi, Vahideh Moghtadaiee
2025Lens Aberrations Detection and Digital Camera Identification with Convolutional Autoencoders.
Jaroslaw Bernacki, Rafal Scherer
2025MATRIX: A Comprehensive Graph-Based Framework for Malware Analysis and Threat Research.
Marco Simoni, Andrea Saracino
2025MICODE: A Minimal Code Design for Secret Sharing Scheme.
Belkacem Imine, Rahul Saha, Mauro Conti
2025MK-SEAC: Multi-Keyword Searchable Encryption with Access Control.
Riccardo Longo, Enrico Sorbera, Valeria Vicard
2025Masked Vector Sampling for HQC.
Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage
2025MorphDet: Towards the Detection of Morphing Attacks.
Jival Kapoor, Priyanka Singh, Manoranjan Mohanty
2025NULLDect: A Dynamic Adaptive Learning Framework for Robust NULL Pointer Dereference Detection.
Tasmin Karim, Md. Shazzad Hossain Shaon, Md. Fahim Sultan, Alfredo Cuzzocrea, Mst. Shapna Akter
2025New Integral Distinguishers and Security Reassessment of LTLBC.
Abhilash Kumar Das
2025On the Security of Opportunistic Re-Keying.
Stefan Lucks, David Schatz, Guenter Schaefer
2025Optimal Noise Injection on Training Data: A Defense Against Membership Inference Attacks.
Radia Kassa, Kamel Adi, Myria Bouhaddi
2025PPVFL-SplitNN: Privacy-Preserving Vertical Federated Learning with Split Neural Networks for Distributed Patient Data.
Bashair Alrashed, Priyadarsi Nanda, Hoang Dinh, Amani Aldahiri, Hadeel Alhosaini, Nojood Alghamdi
2025PRIVÉ: Towards Privacy-Preserving Swarm Attestation.
Nada El Kassem, Wouter Hellemans, Ioannis Siachos, Edlira Dushku, Stefanos Vasileiadis, Dimitrios S. Karas, Liqun Chen, Constantinos Patsakis, Thanassis Giannetsos
2025Post-Quantum Digital Signature Algorithms on IoT: Evaluating Performance on LoRa ESP32 Microcontroller.
Mads Villum Nielsen, Magnus Raagaard Kjeldsen, Togu Turnip, Birger Andersen
2025Post-Quantum Secure Channel Protocols for eSIMs: Design, Validation and Performance Analysis.
Luk Bettale, Emmanuelle Dottax, Laurent Grémy
2025Privacy Risks in Machine Learning: Truths and Myths.
Josep Domingo-Ferrer
2025Privacy-Enhancing Federated Time-Series Forecasting: A Microaggregation-Based Approach.
Sargam Gupta, Vicenç Torra
2025Privacy-Preserving EEG Data Generation: A Federated Split Learning Approach Using Privacy-Adaptive Autoencoders and Secure Aggregation with GFlowNet.
Shouvik Paul, Garima Bajwa
2025Privacy-Preserving Machine Learning in IoT: A Study of Data Obfuscation Methods.
Yonan Yonan, Mohammad O. Abdullah, Felix Nilsson, Mahdi Fazeli, Ahmad Patooghy, Slawomir Nowaczyk
2025Privacy2Practice: Leveraging Automated Analysis for Privacy Policy Transparency and Compliance.
Saja Alqurashi, Indrakshi Ray
2025Proceedings of the 22nd International Conference on Security and Cryptography, SECRYPT 2025, Bilbao, Spain, June 11-13, 2025.
Sabrina De Capitani di Vimercati, Pierangela Samarati
2025RAHE: A Robust Attribute-Based Aggregate Scheme Enhanced with Homomorphic Encryption for 5G-Connected Delivery Drones.
Aagii Mariam Thomas, Sana Belguith
2025RingAuth: User Authentication Using a Smart Ring.
Jack Sturgess, Simon Birnbach, Simon Eberz, Ivan Martinovic
2025Robust Peer-to-Peer Machine Learning Against Poisoning Attacks.
Myria Bouhaddi, Kamel Adi
2025SCAM: Secure Shared Cache Partitioning Scheme to Enhance Throughput of CMPs.
Varun Venkitaraman, Rishab Ravi, Tejeshwar Bhagatsing Thorawade, Nirmal Kumar Boran, Virendra Singh
2025SONNI: Secure Oblivious Neural Network Inference.
Luke Sperling, Sandeep S. Kulkarni
2025Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest.
Federico Valbusa, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher
2025Secure and Hybrid Clustering for IoT Networks: An Adaptive Dynamic Reconfigurability Approach.
Osama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Ibrahim Haddadi
2025Secure and Practical Cold (and Hot) Staking.
Mario Larangeira
2025Software Benchmarking of NIST Lightweight Hash Function Finalists on Resource-Constrained AVR Platform via ChipWhisperer.
Mohsin Khan, Håvard D. Johansen, Dag Johansen
2025Stegoslayer: A Robust Browser-Integrated Approach for Thwarting Stegomalware.
Rushikesh Kawale, Sarath Babu, Virendra Singh
2025Supporting Resilient, Ethical, and Verifiable Anonymous Identities Through Blockchains.
Alberto De Marchi, Lorenzo Gigli, Andrea Melis, Luca Sciullo, Fabio Vitali
2025Synthetic and (Un)Secure: Evaluating Generalized Membership Inference Attacks on Image Data.
Pasquale Coscia, Stefano Ferrari, Vincenzo Piuri, Ayse Salman
2025TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors.
Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Mohammad Ebrahimabadi, Javad Bahrami, Hossein Pourmehrani, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi
2025Threshold Structure-Preserving Signatures with Randomizable Key.
Ahmet Ramazan Agirtas, Emircan Çelik, Sermin Kocaman, Fatih Sulak, Oguz Yayla
2025Towards Quantum Machine Learning in Ransomware Detection.
Francesco Mercaldo, Giovanni Ciaramella, Fabio Martinelli, Antonella Santone
2025Trustworthy and Private AI/ML.
Jaideep Vaidya
2025UOV-Based Verifiable Timed Signature Scheme.
Erkan Uslu, Oguz Yayla
2025VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG).
Md. Rakibul Hasan Talukder, Rakesh Podder, Indrajit Ray
2025Weak, Weak-Insider, and Randomized Weak Privacy in the HPVP Model for RFID.
Ferucio Laurentiu Tiplea