DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN
|
2020 |
Simsek, Goksel |
A Secure and Self-tallying E-voting System Based on Blockchain
|
2020 |
Zeng, Gongxian |
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing
|
2020 |
Wu, Hao-Tian |
Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression
|
2020 |
Hong, Mi Yeon |
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
|
2020 |
Park, Jeman |
Optimized SIKE Round 2 on 64-bit ARM
|
2020 |
Seo, Hwajeong |
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR
|
2020 |
Perera, Maharage Nisansala Sevwandi |
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs)
|
2020 |
Halgas, Lukas |
Strengthened PAKE Protocols Secure Against Malicious Private Key Generator
|
2020 |
Shin, SeongHan |
RC PUF: A Low-Cost and an Fasy-to-Design PUF for Resource-Constrained IoT Devices
|
2020 |
Lee, Sangjae |
Low-Noise LLC Side-Channel Attack with Perf
|
2020 |
Ko, Youngjoo |
Turn On the Lights: User Behavior in Game Environment Using CPTED
|
2020 |
Seo, Jeongeun |
QR Code Watermarking for Digital Images
|
2020 |
Chow, Yang-Wai |
An Extended CTRT for AES-256
|
2020 |
Shin, SeongHan |
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
|
2020 |
Loh, Jia-Ch'ng |
Secret Sharing on Evolving Multi-level Access Structure
|
2020 |
Dutta, Sabyasachi |
A New Password Cracking Model with Generative Adversarial Networks
|
2020 |
Nam, Sungyup |
Is it Possible to Hide My Key into Deep Neural Network?
|
2020 |
Kim, Taehyuk |
On the Automation of Security Testing for IoT Constrained Scenarios. and Antonio Skarmeta
|
2020 |
Matheu, Sara N. |
Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea
|
2020 |
Lee, Jinhee |