Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Inscrypt (15. : 2019 : Nanjing) Information security and cryptology
1. Verfasser: Li, Bingyu (VerfasserIn)
Weitere Verfasser: Wang, Wei (VerfasserIn), Meng, Lingjia (VerfasserIn), Lin, Jingqiang (VerfasserIn), Liu, Xuezhong (VerfasserIn), Wang, Congli (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Improving Division Property Based Cube Attacks by Removing Invalid Monomials 2020 Pan, Senshan
Revocable and Linkable Ring Signature 2020 Zhang, Xinyu
PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework 2020 He, Houhua
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC 2020 Li, Chuang
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model 2020 Zhang, Qihui
Improving ECDLP Computation in Characteristic 2 2020 Zhang, Fangguo
Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy 2020 Chen, Yueyao
Suzzer: A Vulnerability-Guided Fuzzer Based on Deep Learning 2020 Zhao, Yuyue
RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems 2020 Zha, Mingming
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones 2020 Jiang, Hao
Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus 2020 Yang, Yingshan
Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS 2020 Li, Bingyu
A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services 2020 Kumar, Mahender
Improved Integral Attack on Generalized Feistel Cipher 2020 Xu, Zhichao
SymSem: Symbolic Execution with Time Stamps for Deobfuscation 2020 Li, Huayi
Attribute-Based Keyword Search from Lattices 2020 Li, Jie
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems 2020 Moriya, Tomoki
Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service 2020 Tang, Qiang
Consolidating Hash Power in Blockchain Shards with a Forest 2020 Zhao, Jun
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model 2020 Duong, Dung Hoang
Alle Artikel auflisten