Linked e-resources

Details

Blockchain Security
A Blockchain-based Long-Term Time-Stamping Scheme
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and love the Fork
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers
Secure Hierarchical Deterministic Wallet Supporting Stealth Address
Zero-Knowledge Age Restriction for GNU Taler
Privacy
Privacy Leakage in Privacy-Preserving Neural Network Inference
Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences
One vote is enough for analysing privacy
Local Differential Privacy for Federated Learning
XSPIR: Effcient Symmetrically Private Information Retrieval from Ring-LWE
Scaling Up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic
Crypto
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More
Public Key Authenticated Encryption with Keyword Search from LWE
An Effcient Query Recovery Attack Against a Graph Encryption Scheme
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead
A Formal Model for Credential Hopping Attacks
No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent
Effcient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
Attacks
Kallima: A Clean-label Framework for Textual Backdoor Attacks
Two Types of Novel DoS Attacks against CDNs Based on HTTP/2 Flow Control Mechanism
EVExchange: A Relay Attack on Electric Vehicle Charging System
Turrin Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Cyber Network Resilience against Self-Propagating Malware Attacks
INC: In-Network Classification of Botnet Propagation at Line Rate
GAME: Generative-Based Adaptive Model Extraction Attack
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection
Sidechannels We can hear your PIN drop: A new acoustic side channel attack to profile PIN pads keys
VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration.

Browse Subjects

Show more subjects...

Statistics

from
to
Export