Administration of Machine Learning Based Access Control
|
2022 |
Nobi, Mohammad Nur |
Efficient Unique Ring Signatures from Lattices
|
2022 |
Nguyen, Tuong Ngoc |
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems
|
2022 |
Shao, Xinhui |
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
|
2022 |
Lee, Hyunwoo |
How to Verifiably Encrypt Many Bits for an Election?
|
2022 |
Devillez, Henri |
A Toolbox for Verifiable Tally-Hiding E-Voting Systems
|
2022 |
Cortier, Véronique |
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
|
2022 |
Wagner, Isabel |
A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components
|
2022 |
Aldoseri, Abdulla |
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
|
2022 |
Campi, Alessia Michela Di |
Fuzzy Authenticated Key Exchange with Tight Security
|
2022 |
Jiang, Mingming |
Ring Signatures with User-Controlled Linkability
|
2022 |
Fiore, Dario |
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero
|
2022 |
Thyagarajan, Sri AravindaKrishnan |
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing
|
2022 |
Bootle, Jonathan |
Puncturable Signature: A Generic Construction and Instantiations
|
2022 |
Jiang, Mei |
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost
|
2022 |
Susilo, Willy |
Utility-Preserving Biometric Information Anonymization
|
2022 |
Moriarty, Bill |
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
|
2022 |
Zheng, Yubo |
Real-Time Policy Enforcement with Metric First-Order Temporal Logic
|
2022 |
Hublet, François |
Sequential Digital Signatures for Cryptographic Software-Update Authentication
|
2022 |
Poettering, Bertram |
Deterministic Wallets for Adaptor Signatures
|
2022 |
Erwig, Andreas |