XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE
|
2022 |
Lin, Chengyu |
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More
|
2022 |
Le, Huy Quoc |
Public Key Authenticated Encryption with Keyword Search from LWE
|
2022 |
Cheng, Leixiao |
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead
|
2022 |
Wu, Jiaojiao |
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent
|
2022 |
Chen, Huanhuan |
Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism
|
2022 |
Song, Hengxian |
Kallima: A Clean-Label Framework for Textual Backdoor Attacks
|
2022 |
Chen, Xiaoyi |
Local Differential Privacy for Federated Learning
|
2022 |
Arachchige, Pathum Chamikara Mahawaga |
One Vote Is Enough for Analysing Privacy
|
2022 |
Delaune, Stéphanie |
An Efficient Query Recovery Attack Against a Graph Encryption Scheme
|
2022 |
Falzon, Francesca |
A Formal Model for Credential Hopping Attacks
|
2022 |
Albanese, Massimiliano |
Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts
|
2022 |
Vos, Jelle |
EVExchange: A Relay Attack on Electric Vehicle Charging System
|
2022 |
Conti, Mauro |
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
|
2022 |
Hlavacek, Tomas |
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads
|
2022 |
Balagani, Kiran |
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?
|
2022 |
Alupotha, Jayamine |
Secure Hierarchical Deterministic Wallet Supporting Stealth Address
|
2022 |
Yin, Xin |
Zero-Knowledge Age Restriction for GNU Taler
|
2022 |
Kesim, Özgür |
Privacy Leakage in Privacy-Preserving Neural Network Inference
|
2022 |
Wei, Mengqi |
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption
|
2022 |
Luo, Fucai |