Secure Logging with Security Against Adaptive Crash Attack
|
2020 |
Avizheh, Sepideh |
U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme
|
2020 |
Gong, Guang |
An Efficient Identification Scheme Based on Rank Metric
|
2020 |
Ayebie, Edoukou Berenger |
Towards Secure TMIS Protocols
|
2020 |
Gerault, David |
Detecting Ransomware in Encrypted Web Traffic
|
2020 |
Modi, Jaimin |
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications
|
2020 |
Saoudi, Lalia |
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History
|
2020 |
Alshahrani, Mohammed |
Selection and Performance Analysis of CICIDS2017 Features Importance
|
2020 |
Reis, Bruno |
Labelled Network Capture Generation for Anomaly Detection for a Customized, Secure, and
|
2020 |
Nogues, Maël |
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control
|
2020 |
Servos, Daniel |
Dynamic Searchable Encryption with Access Control
|
2020 |
Blömer, Johannes |
Validating the DFA Attack Resistance of AES (Short Paper)
|
2020 |
Sugimoto, Hakuei |
A Privacy Protection Layer for Wearable Devices
|
2020 |
Mohzary, Muhammad |
Command dependencies in heuristic safety analysis of access control models
|
2020 |
Amthor, Peter |
Semantic Representation Based on Deep Learning for Spam Detection
|
2020 |
Saidani, Nadjate |
Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS
|
2020 |
Yang, Meng |
Enroll, and Authentication Will Follow: eID-Based Enrollment for a Customized, Secture, and Frictionless Authentication Experience
|
2020 |
Ranise, Silvio |
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE
|
2020 |
Preuveneers, Davy |
On Attribute Retrieval in ABAC
|
2020 |
Morisset, Charles |
Protecting Android Apps from Repackaging Using Native Code
|
2020 |
Tanner, Simon |