Secure Logging with Security Against Adaptive Crash Attack
|
2020 |
Avizheh, Sepideh |
U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme
|
2020 |
Gong, Guang |
An Efficient Identification Scheme Based on Rank Metric
|
2020 |
Ayebie, Edoukou Berenger |
Towards Secure TMIS Protocols
|
2020 |
Gerault, David |
Detecting Ransomware in Encrypted Web Traffic
|
2020 |
Modi, Jaimin |
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications
|
2020 |
Saoudi, Lalia |
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History
|
2020 |
Alshahrani, Mohammed |
PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks
|
2020 |
Mansouri, Mohamad |
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles
|
2020 |
Shirazi, Hossein |
Ransomware Network Traffic Analysis for Pre-encryption Alert
|
2020 |
Moussaileb, Routa |
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis
|
2020 |
Briguglio, William |
Get-your-ID: Decentralized Proof of Identity
|
2020 |
Lafourcade, Pascal |
Towards Privacy-Aware Smart Surveillance
|
2020 |
Shirima, Emil |
Selection and Performance Analysis of CICIDS2017 Features Importance
|
2020 |
Reis, Bruno |
Labelled Network Capture Generation for Anomaly Detection for a Customized, Secure, and
|
2020 |
Nogues, Maël |
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control
|
2020 |
Servos, Daniel |
Dynamic Searchable Encryption with Access Control
|
2020 |
Blömer, Johannes |
Validating the DFA Attack Resistance of AES (Short Paper)
|
2020 |
Sugimoto, Hakuei |
A Privacy Protection Layer for Wearable Devices
|
2020 |
Mohzary, Muhammad |
Command dependencies in heuristic safety analysis of access control models
|
2020 |
Amthor, Peter |