Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost
|
2022 |
Susilo, Willy |
Utility-Preserving Biometric Information Anonymization
|
2022 |
Moriarty, Bill |
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
|
2022 |
Zheng, Yubo |
Real-Time Policy Enforcement with Metric First-Order Temporal Logic
|
2022 |
Hublet, François |
Sequential Digital Signatures for Cryptographic Software-Update Authentication
|
2022 |
Poettering, Bertram |
Deterministic Wallets for Adaptor Signatures
|
2022 |
Erwig, Andreas |
IoTEnsemble: Detection of Botnet Attacks on Internet of Things
|
2022 |
Li, Ruoyu |
Collaborative Anomaly Detection System for Charging Stations
|
2022 |
Cumplido, Jesus |
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
|
2022 |
Wagner, Isabel |
A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components
|
2022 |
Aldoseri, Abdulla |
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
|
2022 |
Campi, Alessia Michela Di |
Fuzzy Authenticated Key Exchange with Tight Security
|
2022 |
Jiang, Mingming |
Ring Signatures with User-Controlled Linkability
|
2022 |
Fiore, Dario |
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero
|
2022 |
Thyagarajan, Sri AravindaKrishnan |
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing
|
2022 |
Bootle, Jonathan |
Puncturable Signature: A Generic Construction and Instantiations
|
2022 |
Jiang, Mei |
Anonymous Traceback for End-to-End Encryption
|
2022 |
Kenney, Erin |
Verifying the Quality of Outsourced Training on Clouds
|
2022 |
Li, Peiyang |
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
|
2022 |
Wang, Xingkai |
Robust and Scalable Process Isolation Against Spectre in the Cloud
|
2022 |
Schwarzl, Martin |