Exploiting hot spots in heuristic safety analysis of dynamic access control models
|
2020 |
Schlegel, Marius |
FPGA-based McEliece Cryptosystem using Non-linear Convolutional Codes
|
2020 |
Sone, Michael Ekonde |
An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data
|
2020 |
Hammami, Hamza |
Decentralized Multi-Client Attribute Based Functional Encryption
|
2020 |
Chen, Yuechen |
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures
|
2020 |
Marillonnet, Paul |
Optimal Transport Layer for Secure Computation
|
2020 |
Brandt, Markus |
Practically Efficient Attribute-based Encryption for Compartmented Access Structures
|
2020 |
Tiplea, Ferucio Laurentiu |
Round-optimal Constant-size Blind Signatures
|
2020 |
Blazy, Olivier |
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System
|
2020 |
Kaaniche, Nesrine |
Linear Generalized ElGamal Encryption Scheme
|
2020 |
Lafourcade, Pascal |
Accelerating Homomorphic Encryption using Approximate Computing Techniques
|
2020 |
Khanna, Shabnam |
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting
|
2020 |
Denis, Nathanael |
Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private
|
2020 |
Tajan, Louis |
VIP Blowfish Privacy in Communication Graphs
|
2020 |
Nassar, Mohamed |
Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices
|
2020 |
Grande, Elias |
Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory
|
2020 |
Stan, Oana |
Providing Secured Access Delegation in Identity Management Systems
|
2020 |
Shehu, Abubakar-Sadig |
An Innovative Self-Healing Approach with STIX Data Utilisation
|
2020 |
Spyros, Arnolnt |
Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure
|
2020 |
Negre, Christophe |
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems
|
2020 |
Anisetti, Marco |