A Survey on Identity-Based Blind Signature
|
2023 |
Koscina, Mirko |
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
|
2023 |
Brisfors, Martin |
Towards a Maturity Model for Crypto-Agility Assessment
|
2023 |
Hohm, Julian |
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms
|
2023 |
Casanove, Olivier de |
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
|
2023 |
Fraunholz, Daniel |
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
|
2023 |
Krentz, Konrad-Felix |
Deep-Learning-Based Vulnerability Detection in Binary Executables
|
2023 |
Schaad, Andreas |
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection
|
2023 |
Burda, Pavlo |
A New Class of Trapdoor Verifiable Delay Functions
|
2023 |
Zawia, Ahmed |
Underwater Confidential Communications in JANUS
|
2023 |
Beaupré, Yannick |
SCADA Radio Blackbox Reverse Engineering
|
2023 |
Larouche, Jean-Benoit |
Money Transfer on Transaction Signature-Based Ledger
|
2023 |
Shiraishi, Momoko |
A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency Wallets
|
2023 |
Sans, Thierry |
Towards Characterizing IoT Software Update Practices
|
2023 |
Bradley, Conner |
Security Analysis of Improved EDHOC Protocol
|
2023 |
Cottier, Baptiste |
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone
|
2023 |
Bettaieb, Slim |
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications
|
2023 |
Bendoukha, Adda Akram |
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework
|
2023 |
Ayoubi, Solayman |
A Taxonomy and Gap-Analysis in Digital Privacy Education
|
2023 |
Paul, Sumit Kumar |
Defense Models for Data Recovery in Industrial Control Systems
|
2023 |
Jawad, Alvi |