A Survey on Identity-Based Blind Signature
|
2023 |
Koscina, Mirko |
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
|
2023 |
Brisfors, Martin |
Towards a Maturity Model for Crypto-Agility Assessment
|
2023 |
Hohm, Julian |
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms
|
2023 |
Casanove, Olivier de |
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
|
2023 |
Fraunholz, Daniel |
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
|
2023 |
Krentz, Konrad-Felix |
Deep-Learning-Based Vulnerability Detection in Binary Executables
|
2023 |
Schaad, Andreas |
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection
|
2023 |
Burda, Pavlo |
A New Class of Trapdoor Verifiable Delay Functions
|
2023 |
Zawia, Ahmed |
Underwater Confidential Communications in JANUS
|
2023 |
Beaupré, Yannick |
SCADA Radio Blackbox Reverse Engineering
|
2023 |
Larouche, Jean-Benoit |
Money Transfer on Transaction Signature-Based Ledger
|
2023 |
Shiraishi, Momoko |
A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency Wallets
|
2023 |
Sans, Thierry |
Towards Characterizing IoT Software Update Practices
|
2023 |
Bradley, Conner |
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher
|
2023 |
Ebrahimi, Amirhossein |
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter
|
2023 |
Mohzary, Muhammad |
Where is the Virtual Machine Within CPYTHON?
|
2023 |
Bonfante, Guillaume |
Differentially Private Friends Recommendation
|
2023 |
Macwan, Kamalkumar |
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts
|
2023 |
Gill, Puneet |
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic
|
2023 |
Tahmi, Omar |