default search action
22nd ACNS 2024: Abu Dhabi, United Arab Emirates - Workshops Part II
- Martin Andreoni:
Applied Cryptography and Network Security Workshops - ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14587, Springer 2024, ISBN 978-3-031-61488-0
AAC - Workshop on Advances in Asymmetric Cryptanalysis
- Lorenz Panny:
Forging Tropical Signatures. 3-7 - Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding. 8-28 - Kévin Carrier, Valérian Hatey, Jean-Pierre Tillich:
Projective Space Stern Decoding and Application to SDitH. 29-52
SiMLA - Security in Machine Learning and its Applications
- Alessandro Brighente, Mauro Conti, Sitora Salaeva, Federico Turrin:
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection. 55-74 - Kota Yoshida, Takeshi Fujino:
Model Extraction Attack Without Natural Images. 75-83 - Amirhossein Ebrahimi Moghaddam, Buvana Ganesh, Paolo Palmieri:
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms. 84-100 - Ruilin Wang, Chuadhry Mujeeb Ahmed:
Differential Privacy with Selected Privacy Budget ε in a Cyber Physical System Using Machine Learning. 101-116
LEE - Low-Latency Encryption
- Zheng Zhao, Qun Liu, Yanhong Fan, Meiqin Wang:
Construction of 4 ˟ 4 Lightweight Low-Latency Involutory MDS Matrices. 119-140
CIMSS - Critical Infrastructure and Manufacturing System Security
- Meixuan Li, Awais Yousaf, Mark Goh, Jianying Zhou, Sudipta Chattopadhyay:
Guidelines for Cyber Risk Management in Autonomous Shipping. 143-161 - Apurva K. Vangujar, Alia Umrani, Paolo Palmieri:
Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs. 162-179
Posters
- Kamil Kaczynski, Michal Glet:
One Time Chat - A Toy End-to-End Encrypted Web Messaging Service. 183-187 - K. C. Lalropuia, Sanjeev Goyal, Borja Garcia de Soto:
Game Theoretic Modeling of Insider Threats in an Organization. 188-192 - Rajesh Nayak, C. D. Jaidhar:
Smart Appliance Abnormal Electrical Power Consumption Detection. 193-197 - Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, Robert H. Schmitt:
Towards Secure 5G Infrastructures for Production Systems. 198-203 - Daniel Köhler, Michael Büßemeyer, Christoph Meinel:
Cybersecurity Awareness Education: Just as Useful for Technical Users. 204-208 - Nitin Kumar Sharma, Sabyasachi Dey:
Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key Bits. 209-213 - Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A Versatile and Unified HQC Hardware Accelerator. 214-219 - Hendrik Graupner, François-Nima Thobae, Christoph Meinel:
Applying Self-recognition Biometrics to Live Deepfake Detection in Video Conferences. 220-224 - Tanusree Ghosh, Ruchira Naskar:
GAN and DM Generated Synthetic Image Detection in the Age of Misinformation. 225-229 - Mario Yaksetig:
Extremely Simple Fail-Stop ECDSA Signatures. 230-234 - Navajit Singh Baban, Jiarui Zhou, Sarani Bhattacharya, Urbi Chatterjee, Sukanta Bhattacharjee, Sanjairaj Vijayavenkataraman, Yong-Ak Song, Debdeep Mukhopadhyay, Krishnendu Chakrabarty, Ramesh Karri:
Physically Unclonable Fingerprints for Authentication. 235-239
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.