default search action
21st ACNS 2023: Kyoto, Japan - Workshops
- Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9
ADSC - Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis
- Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. 3-22 - Tianyu Zhang:
Comprehensive Preimage Security Evaluations on Rijndael-Based Hashing. 23-42 - Mohammad Vaziri, Vesselin Velichkov:
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak. 43-62
AIBlock - Application Intelligence and Blockchain Security
- Yuxiao Wu, Shoji Kasahara:
Smart Contract-Based E-Voting System Using Homomorphic Encryption and Zero-Knowledge Proof. 67-83 - Ivan Visconti, Andrea Vitaletti, Marco Zecchini:
Preventing Content Cloning in NFT Collections. 84-99 - Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan:
NFT Trades in Bitcoin with Off-Chain Receipts. 100-117
AIHWS - Artificial Intelligence in Hardware Security
- Thomas Marquet, Elisabeth Oswald:
A Comparison of Multi-task Learning and Single-Task Learning Approaches. 121-138 - Thomas Schamberger, Maximilian Egger, Lars Tebelmann:
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs - An Evaluation of the ASCAD Databases. 139-158 - Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova:
Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber. 159-177 - Asmita Adhikary, Ileana Buhan:
SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI. 178-195 - Dirmanto Jap, Shivam Bhasin:
Using Model Optimization as Countermeasure against Model Recovery Attacks. 196-209
AIoTS - Artificial Intelligence and Industrial IoT Security
- Ali Hussain Khan, Naveed Ul Hassan, Chuadhry Mujeeb Ahmed, Zartash Afzal Uzmi, Chau Yuen:
Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks. 215-230 - Jiahui Lim, Wen Shei Ong, Utku Tefek, Ertem Esiner:
A Security Policy Engine for Building Energy Management Systems. 231-244 - Eyasu Getahun Chekole, Rajaram Thulasiraman, Jianying Zhou:
EARIC: Exploiting ADC Registers in IoT and Control Systems. 245-265
CIMSS - Critical Infrastructure and Manufacturing System Security
- Guining Geng, Junfeng Miao, Nan Xiao:
Round-Efficient Security Authentication Protocol for 5G Network. 269-283 - Yong Wang, Rui Wang, Xin Liu, Donglan Liu, Hao Zhang, Lei Ma, Fangzhe Zhang, Lili Sun, Zhenghao Li:
A Framework for TLS Implementation Vulnerability Testing in 5G. 284-298 - Sim Siang Tze Victor, Chuadhry Mujeeb Ahmed, Koh Yoong Keat Kelvin, Jianying Zhou:
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems. 299-320 - Mahender Kumar, Gregory Epiphaniou, Carsten Maple:
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems. 321-335 - Fuyi Wang, Yanping Wang, Leo Yu Zhang, Yuval Hertzog, Michael Loewy, Dominique Valladolid, Julio Medeiros, Muna Al-Hawawreh, Robin Doss:
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM. 336-354
Cloud S&P - Cloud Security and Privacy
- Francesco Intoci, Sinem Sav, Apostolos Pyrgelis, Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference. 359-377 - Aicha Miloudi, Luis Carlos Suárez, Nora Boulahia-Cuppens, Frédéric Cuppens, Stere Preda:
Trust Management Framework for Containerized Workloads Applications to 5G Networks. 378-393
SCI - Secure Cryptographic Implementation
- Wenyuan Li, Wei Wang, Fan Lang, Linli Lu, Heqing Huang:
cPSIR: Circuit-Based Private Stateful Information Retrieval for Private Media Consumption. 399-418 - Tongxia Deng, Ping Li, Shunzhi Yang, Yupeng Zhang, Zheng Gong, Ming Duan, Yiyuan Luo:
A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers. 419-438 - Haosong Zhao, Rui Su, Rui Lin, Jiankuo Dong, Donglong Chen:
Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform. 439-458 - Feng Yang, Hui Cui, Jiwu Jing:
Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation. 459-479 - Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein:
Hybrid Post-quantum Signatures in Hardware Security Keys. 480-499 - Gustavo Banegas, Florian Caullery:
Multi-armed SPHINCS+. 500-514 - Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao:
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. 515-529 - Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret. 530-550
SecMT - Security in Mobile Technologies
- Federico Carboni, Mauro Conti, Denis Donadel, Mariano Sciacco:
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. 553-570 - Zahra Tarkhani, Anil Madhavapeddy:
Enabling Lightweight Privilege Separation in Applications with MicroGuards. 571-598
SiMLA - Security in Machine Learning and its Applications
- Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
Eliminating Adversarial Perturbations Using Image-to-Image Translation Method. 601-620 - Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno:
Federated Learning Approach for Distributed Ransomware Analysis. 621-641 - Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks. 642-656
Posters
- Michal Glet, Kamil Kaczynski:
POSTER: Ransomware Detection Mechanism - Project Status at the Beginning of 2023. 659-663 - Joon Kuy Han, Dennis Wong, Byungkon Kang:
POSTER: AuthZit: Multi-modal Authentication with Visual-Spatial and Text Secrets. 664-668 - Hung-Yu Chien:
POSTER: Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT. 669-674 - Myung-Hyun Kim, Taek-Young Youn, Seungkwang Lee:
POSTER: Stopping Run-Time Countermeasures in Cryptographic Primitives. 675-679 - Thomas Schiller, Sean C. Mondesire:
POSTER: Swarm-Based IoT Network Penetration Testing by IoT Devices. 680-684 - Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance. 685-689 - Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses. 690-694 - Juris Viksna, Sergejs Kozlovics, Edgars Rencis:
POSTER: Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks. 695-699 - Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems. 700-704 - Neha Joshi, Abhishek Thakur, A. Antony Franklin:
POSTER: PriAuct: Privacy Preserving Auction Mechanism. 705-709 - Ken Watanabe, Kazue Sako:
POSTER: Using Verifiable Credentials for Authentication of UAVs in Logistics. 710-715 - Yuji Suga:
POSTER: A Card-Based Protocol that Lets You Know How Close Two Parties are in their Opinions (agree/disagree) by Using a Four-Point Likert Scale. 716-721 - Dequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, Weizheng Wang:
POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption. 722-726
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.