Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 1
1. Verfasser: Le, Huy Quoc (VerfasserIn)
Weitere Verfasser: Duong, Dung Hoang (VerfasserIn), Susilo, Willy (VerfasserIn), Pieprzyk, Josef (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers? 2022 Alupotha, Jayamine
Secure Hierarchical Deterministic Wallet Supporting Stealth Address 2022 Yin, Xin
Zero-Knowledge Age Restriction for GNU Taler 2022 Kesim, Özgür
Privacy Leakage in Privacy-Preserving Neural Network Inference 2022 Wei, Mengqi
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption 2022 Luo, Fucai
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic 2022 David, Liron
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability 2022 Liu, Yi
Cyber Network Resilience Against Self-Propagating Malware Attacks 2022 Chernikova, Alesia
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports 2022 Li, Zhenyuan
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration 2022 Gangwal, Ankit
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents 2022 Lambregts, Steven
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange 2022 Qin, Yue
Local Differential Privacy for Federated Learning 2022 Arachchige, Pathum Chamikara Mahawaga
One Vote Is Enough for Analysing Privacy 2022 Delaune, Stéphanie
An Efficient Query Recovery Attack Against a Graph Encryption Scheme 2022 Falzon, Francesca
A Formal Model for Credential Hopping Attacks 2022 Albanese, Massimiliano
Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts 2022 Vos, Jelle
EVExchange: A Relay Attack on Electric Vehicle Charging System 2022 Conti, Mauro
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks 2022 Hlavacek, Tomas
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads 2022 Balagani, Kiran
Alle Artikel auflisten