Linked e-resources

Details

Cryptography
Security Analysis of Improved EDHOC Protocol
A Survey on Identity-based Blind Signature
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone
A New Class of Trapdoor Verifiable Delay Functions
Practical homomorphic evaluation of block-cipher-based hash functions with applications
Towards a maturity model for crypto-agility assessment
Machine Learning
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher
Data-driven Evaluation of Intrusion Detectors : a Methodological Framework
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter
Cybercrime and Privacy
Where is The Python Interpreter?
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms
A Taxonomy and Gap-analysis in Digital Privacy Education
Differentially Private Friends Recommendation
Physical-layer Security
Underwater Confidential Communications in JANUS
Defense Models for Data Recovery in Industrial Control Systems
SCADA Radio Blackbox Reverse Engineering
Blockchain
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts
Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts
Money Transfer on Transaction Signature-based Ledger
A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets
IoT and Security Protocols
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
Towards Characterizing IoT Software Update Practices
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic
Short Papers
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection
Deep-Learning-Based Vulnerability Detection in Binary Executables
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.

Browse Subjects

Show more subjects...

Statistics

from
to
Export