Local Differential Privacy for Federated Learning
|
2022 |
Arachchige, Pathum Chamikara Mahawaga |
One Vote Is Enough for Analysing Privacy
|
2022 |
Delaune, Stéphanie |
An Efficient Query Recovery Attack Against a Graph Encryption Scheme
|
2022 |
Falzon, Francesca |
A Formal Model for Credential Hopping Attacks
|
2022 |
Albanese, Massimiliano |
Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts
|
2022 |
Vos, Jelle |
EVExchange: A Relay Attack on Electric Vehicle Charging System
|
2022 |
Conti, Mauro |
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
|
2022 |
Hlavacek, Tomas |
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads
|
2022 |
Balagani, Kiran |
A Blockchain-Based Long-Term Time-Stamping Scheme
|
2022 |
Meng, Long |
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
|
2022 |
Buser, Maxime |
Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork
|
2022 |
Stifter, Nicholas |
Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences
|
2022 |
Mendes, Ricardo |
INC: In-Network Classification of Botnet Propagation at Line Rate
|
2022 |
Friday, Kurt |
GAME: Generative-Based Adaptive Model Extraction Attack
|
2022 |
Xie, Yi |
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection
|
2022 |
Liu, Xinjing |
XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE
|
2022 |
Lin, Chengyu |
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More
|
2022 |
Le, Huy Quoc |
Public Key Authenticated Encryption with Keyword Search from LWE
|
2022 |
Cheng, Leixiao |
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead
|
2022 |
Wu, Jiaojiao |
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent
|
2022 |
Chen, Huanhuan |