Linked e-resources

Details

Anonymity
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
Utility-Preserving Biometric Information Anonymization
Anonymous Traceback for End-to-End Encryption
Cloud Security
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost
DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay
Lighter Is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
Verifying the Quality of Outsourced Training on Clouds
SecQuant: Quantifying Container System Call Exposure
Dynamic Process Isolation
Access Control
Administration of Machine Learning Based Access Control
Real-time Policy Enforcement with Metric First-Order Temporal Logic
A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android through App Components
Authentication
Sequential Digital Signatures for Cryptographic Software-Update Authentication
On Committing Authenticated Encryption
Quantum-Resistant Password Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
Fuzzy Authenticated Key Exchange with Tight Security
Continuous Authentication in Secure Messaging
Digital Signatures
Half-Aggregation of Schnorr Signatures with Tight Reductions
Ring Signatures with User-Controlled Linkability
DualDory: Logarithmic-verifier linkable ring signatures through preprocessing
Effcient Unique Ring Signatures From Lattices
Kiyomoto Verifiable Timed Linkable Ring Signatures For Scalable Payments for Monero
Deterministic Wallets for Adaptor Signatures
Puncturable Signature: A Generic Construction and Instantiations
IoT Security
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
IoTEnsemble: Detection of Botnet Attacks on Internet of Things
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
No-Label User-Level Membership Inference for ASR Model Auditing
Applications
A toolbox for verifiable tally-hiding e-voting systems
How to Verifiably Encrypt Many Bits for an Election
A framework for constructing Single Secret Leader Election from MPC
AppBastion: Protection from Untrusted Apps and OSes on ARM
Collaborative anomaly detection system for charging stations.

Browse Subjects

Show more subjects...

Statistics

from
to
Export