Linked e-resources

Details

ADSC – Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak
AIBlock – Application Intelligence and Blockchain Security Smart Contract-based E-Voting System Using Homomorphic Encryption and Zero-knowledge Proof
Preventing Content Cloning in NFT Collections
NFT Trades in Bitcoin with Off-chain Receipts
AIHWS – Artificial Intelligence in Hardware Security A Comparison of Multi-task learning and Single-task learning Approaches
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs
Secret Key Recovery Attack on Masked and Shuffed Implementations of CRYSTALS-Kyber and Saber
SoK: Assisted Fault Simulation Existing Challenges and Opportunities Offered by AI
Using Model Optimization as Countermeasure against Model Recovery Attacks
AIoTS – Artificial Intelligence and Industrial IoT Security
Blockchain-enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks
A Security Policy Engine for Building Energy Management Systems
EARIC: Exploiting ADC Registers in IoT and Control Systems
CIMSS – Critical Infrastructure and Manufacturing System Security Round-Effcient Security Authentication Protocol for 5G Network
A Framework for TLS Implementation Vulnerability Testing in 5G
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM
Cloud S&P – Cloud Security and Privacy slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference
Trust Management Framework for Containerized Workloads – Applications to 5G Networks
SCI – Secure Cryptographic Implementation
cPSIR: Circuit-based Private Stateful Information Retrieval for Private Media Consumption
A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers
Effcient Arithmetic for Polynomial Multiplication in Post-Quantum Lattice-based Cryptosystem on RISC-V Platform
Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation
Hybrid Post-Quantum Signatures in Hardware Security Keys
Multi-Armed SPHINCS+
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret
SecMT – Security in Mobile Technologies
If you’re scanning this, it’s too late! A QR Code-based Fuzzing Methodology to Identify Input Vulnerabilities In Mobile Apps
Enabling Lightweight Privilege Separation in Applications with MicroGuards
SiMLA – Security in Machine Learning and its Applications
Eliminating Adversarial Perturbations Using Image-to-Image Translation Method
Federated Learning Approach for Distributed Ransomware Analysis
Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks
POSTERS
Ransomware detection mechanism – Project status at the beginning of 2023
AuthZit: Multi-Modal Authentication with Visual-Spatial and Text Secrets
Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Effciency of MQTT
Stopping Run-time Countermeasures in Cryptographic Primitives
Swarm-based IoT Network Penetration Testing by IoT Devices
Advancing Federated Edge Computing with Continual Learning for Secure and Effcient Performance
A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses
Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks
Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems
PriAuct: Privacy Preserving Auction Mechanism
Using Verifiable Credentials for Authentication of UAVs in Logistics
A card-based protocol that lets you know how close two parties are in their opinions (agree/disagree) by using a four-point Likert scale
Collaborative Authority-Based Searchable Encryption Using Access Control Encryption.

Browse Subjects

Show more subjects...

Statistics

from
to
Export