Administration of Machine Learning Based Access Control
|
2022 |
Nobi, Mohammad Nur |
Efficient Unique Ring Signatures from Lattices
|
2022 |
Nguyen, Tuong Ngoc |
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems
|
2022 |
Shao, Xinhui |
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
|
2022 |
Lee, Hyunwoo |
How to Verifiably Encrypt Many Bits for an Election?
|
2022 |
Devillez, Henri |
A Toolbox for Verifiable Tally-Hiding E-Voting Systems
|
2022 |
Cortier, Véronique |
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
|
2022 |
Wagner, Isabel |
A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components
|
2022 |
Aldoseri, Abdulla |
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
|
2022 |
Campi, Alessia Michela Di |
Fuzzy Authenticated Key Exchange with Tight Security
|
2022 |
Jiang, Mingming |
Ring Signatures with User-Controlled Linkability
|
2022 |
Fiore, Dario |
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero
|
2022 |
Thyagarajan, Sri AravindaKrishnan |
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing
|
2022 |
Bootle, Jonathan |
Puncturable Signature: A Generic Construction and Instantiations
|
2022 |
Jiang, Mei |
Anonymous Traceback for End-to-End Encryption
|
2022 |
Kenney, Erin |
Verifying the Quality of Outsourced Training on Clouds
|
2022 |
Li, Peiyang |
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
|
2022 |
Wang, Xingkai |
Robust and Scalable Process Isolation Against Spectre in the Cloud
|
2022 |
Schwarzl, Martin |
SecQuant: Quantifying Container System Call Exposure
|
2022 |
Jang, Sunwoo |
On Committing Authenticated-Encryption
|
2022 |
Chan, John |