Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?
|
2022 |
Alupotha, Jayamine |
Secure Hierarchical Deterministic Wallet Supporting Stealth Address
|
2022 |
Yin, Xin |
Zero-Knowledge Age Restriction for GNU Taler
|
2022 |
Kesim, Özgür |
Privacy Leakage in Privacy-Preserving Neural Network Inference
|
2022 |
Wei, Mengqi |
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption
|
2022 |
Luo, Fucai |
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic
|
2022 |
David, Liron |
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
|
2022 |
Liu, Yi |
Cyber Network Resilience Against Self-Propagating Malware Attacks
|
2022 |
Chernikova, Alesia |
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
|
2022 |
Li, Zhenyuan |
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration
|
2022 |
Gangwal, Ankit |
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents
|
2022 |
Lambregts, Steven |
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange
|
2022 |
Qin, Yue |
Local Differential Privacy for Federated Learning
|
2022 |
Arachchige, Pathum Chamikara Mahawaga |
One Vote Is Enough for Analysing Privacy
|
2022 |
Delaune, Stéphanie |
An Efficient Query Recovery Attack Against a Graph Encryption Scheme
|
2022 |
Falzon, Francesca |
A Formal Model for Credential Hopping Attacks
|
2022 |
Albanese, Massimiliano |
Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts
|
2022 |
Vos, Jelle |
EVExchange: A Relay Attack on Electric Vehicle Charging System
|
2022 |
Conti, Mauro |
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
|
2022 |
Hlavacek, Tomas |
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads
|
2022 |
Balagani, Kiran |