Strong Known Related-Key Attacks and the Security of ECDSA
|
2019 |
Yuen, Tsz Hon |
Threat Assessment of Enterprise Applications via Graphical Modelling
|
2019 |
Bilur, Manjunath |
Towards Secure Open Banking Architecture: An Evaluation with OWASP
|
2019 |
Kellezi, Deina |
OVERSCAN: OAuth 2.0 Scanner for Missing Parameters
|
2019 |
Sumongkayothin, Karin |
Detecting Intruders by User File Access Patterns
|
2019 |
Huang, Shou-Hsuan S. |
Sequential Aggregate MACs with Detecting Functionality Revisted
|
2019 |
Sato, Shingo |
EEG-Based Person Authentication with Variational Universal Background Model
|
2019 |
Tran, Huyen |
A Comparative Study on Network Traffic Clustering
|
2019 |
Liu, Yang |
Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures
|
2019 |
Liu, Jinhui |
Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices
|
2019 |
Perera, Maharage Nisansala Sevwandi |
Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
|
2019 |
Omri, Othmane El |
Ethereum Analysis via Node Clustering
|
2019 |
Sun, Hanyi |
A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing
|
2019 |
Wang, Yawei |
Distributed Secure Storage System Based on Blockchain and TPA
|
2019 |
Wang, Huili |
Pre-adjustment Based Anti-collusion Mechanism for Audio Signals
|
2019 |
Zhao, Juan |
Privacy Preserving Machine Learning with Limited Information Leakage
|
2019 |
Tang, Wenyi |
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Contrained IoT
|
2019 |
Solomon, Gabriel Jerome |
Gnocci: Multiplexed Payment Channels for Cryptocurrencies
|
2019 |
Pan, Chen |
Tell Them from Me: An Encrypted Application Profiler
|
2019 |
Mamun, Mohammad |
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost
|
2019 |
Zheng, Rongxin |