On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection
|
2022 |
Koffas, Stefanos |
A Methodology for Training Homomorphic Encryption Friendly Neural Networks
|
2022 |
Baruch, Moran |
Scalable and Secure HTML5 Canvas-Based User Authentication
|
2022 |
Rivera, Esteban |
POSTER: Ransomware Detection Mechanism - Current State of the Project
|
2022 |
Glet, Michał |
POSTER: Enabling User-Accountable Mechanisms in Decision Systems
|
2022 |
Giustolisi, Rosario |
POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things
|
2022 |
Kamel, Mohammed B. M. |
A Side-Channel Based Disassembler for the ARM-Cortex M0
|
2022 |
van Geest, Jurian |
SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains
|
2022 |
Lim, Yong Zhi |
Output Prediction Attacks on Block Ciphers Using Deep Learning
|
2022 |
Kimura, Hayato |
RATLS: Integrating Transport Layer Security with Remote Attestation
|
2022 |
Walther, Robert |
DLPFS: The Data Leakage Prevention FileSystem
|
2022 |
Braghin, Stefano |
The Etiology of Cybersecurity
|
2022 |
Ambrosi, Michele |
POSTER: A Transparent Remote Quantum Random Number Generator over a Quantum-Safe Link
|
2022 |
Kozlovičs, Sergejs |
Poster: Key Generation Scheme Based on Physical Layer
|
2022 |
Zhao, Hong |
HolA: Holistic and Autonomous Attestation for IoT Networks
|
2022 |
Visintin, Alessandro |
Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database
|
2022 |
Gong, Jianpeng |
Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation
|
2022 |
Zhang, Yaoyuan |
Towards Isolated AI Accelerators with OP-TEE on SoC-FPGAs
|
2022 |
Nakai, Tsunato |
S-box Pooling: Towards More Efficient Side-Channel Security Evaluations
|
2022 |
Zhou, Yuanyuan |
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture
|
2022 |
Zhang, Jingci |