Linked e-resources
Details
Table of Contents
Malware and attacks
Persistence in Linux-Based IoT Malware
Real-time triggering of Android memory dumps for stealthy attack investigation
Using Features of Encrypted Network Traffic to Detect Malware
Formal analysis
Machine-checking the universal verifiability of ElectionGuard
Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme
Applied cryptography
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption
TLV-to-MUC Express: Post-quantum MACsec in VXLAN
On the Certi cate Revocation Problem in the Maritime Sector
Security mechanisms and training
HoneyHash: Honeyword Generation Based on Transformed Hashes
Agent-based File Extraction Using Virtual Machine Introspection
Cyber range automation overview with a case study of CRATE
Applications and privacy
Privacy Analysis of COVID-19 Contact Tracing Apps in the EU
OnLITE: On-line Label for IoT Transparency Enhancement
An Investigation of Comic-Based Permission Requests.
Persistence in Linux-Based IoT Malware
Real-time triggering of Android memory dumps for stealthy attack investigation
Using Features of Encrypted Network Traffic to Detect Malware
Formal analysis
Machine-checking the universal verifiability of ElectionGuard
Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme
Applied cryptography
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption
TLV-to-MUC Express: Post-quantum MACsec in VXLAN
On the Certi cate Revocation Problem in the Maritime Sector
Security mechanisms and training
HoneyHash: Honeyword Generation Based on Transformed Hashes
Agent-based File Extraction Using Virtual Machine Introspection
Cyber range automation overview with a case study of CRATE
Applications and privacy
Privacy Analysis of COVID-19 Contact Tracing Apps in the EU
OnLITE: On-line Label for IoT Transparency Enhancement
An Investigation of Comic-Based Permission Requests.