Strong Known Related-Key Attacks and the Security of ECDSA
|
2019 |
Yuen, Tsz Hon |
Threat Assessment of Enterprise Applications via Graphical Modelling
|
2019 |
Bilur, Manjunath |
Towards Secure Open Banking Architecture: An Evaluation with OWASP
|
2019 |
Kellezi, Deina |
OVERSCAN: OAuth 2.0 Scanner for Missing Parameters
|
2019 |
Sumongkayothin, Karin |
Detecting Intruders by User File Access Patterns
|
2019 |
Huang, Shou-Hsuan S. |
Sequential Aggregate MACs with Detecting Functionality Revisted
|
2019 |
Sato, Shingo |
EEG-Based Person Authentication with Variational Universal Background Model
|
2019 |
Tran, Huyen |
A Comparative Study on Network Traffic Clustering
|
2019 |
Liu, Yang |
Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures
|
2019 |
Liu, Jinhui |
Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices
|
2019 |
Perera, Maharage Nisansala Sevwandi |
Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
|
2019 |
Omri, Othmane El |
Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks
|
2019 |
Santoso, Bagus |
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey
|
2019 |
Gan, Qingqing |
Using Audio Characteristics for Mobile Device Authentication
|
2019 |
Dekker, Matthew |
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique
|
2019 |
Xiong, Zhentian |
A Practical Dynamic Enhanced BFT Protocol
|
2019 |
Shen, Feng |
An Efficient Vulnerability Detection Model for Ethereum Smart Contracts
|
2019 |
Song, Jingjing |
Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP
|
2019 |
Luo, Juan |
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration
|
2019 |
Zhang, Jiacheng |
Difficulty of Decentralized Structure Due to Rational User Bahavior on Blockchain
|
2019 |
Imamura, Mitsuyoshi |