default search action
19th ACNS 2021: Kamakura, Japan - Workshops
- Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5
AIBlock - Application Intelligence and Blockchain Security
- Lim Yong Zhi, Jianying Zhou, Martin Saerbeck:
Shaping Blockchain Technology for Securing Supply Chains. 3-18 - Jing Xu, Fei Xu, Chi Xu:
The Obfuscation Method of User Identification System. 19-26 - Panagiotis Chatzigiannis, Konstantinos Chalkias:
Proof of Assets in the Diem Blockchain. 27-41 - Yihong Wen, Cong Peng, Shicheng Wang, Li Li, Min Luo:
An Identity-Based Blind Signature Scheme with Message Recovery from Pairings. 42-55
AIHWS - Artificial Intelligence in Hardware Security
- Anirban Chakraborty, Manaar Alam, Debdeep Mukhopadhyay:
A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning. 59-77 - Kota Yoshida, Takeshi Fujino:
Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment. 78-95 - Lukasz Chmielewski, Leo Weissbart:
On Reverse Engineering Neural Network Implementation on GPU. 96-113 - Lichao Wu, Guilherme Perin:
On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis. 114-132 - Laurens Le Jeune, Toon Goedemé, Nele Mentens:
Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA. 133-150 - Tsunato Nakai, Daisuke Suzuki, Takeshi Fujino:
Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments. 151-168
AIoTS - Artificial Intelligence and Industrial IoT Security
- Cher Chye Lee, Teik Guan Tan, Vishal Sharma, Jianying Zhou:
Quantum Computing Threat Modelling on a Generic CPS Setup. 171-190 - Muhammad M. Roomi, Daisuke Mashima, Nandha Kumar Kandasamy, Partha P. Biswas:
Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart Grid. 191-208 - Salimah Liyakkathali, Gayathri Sugumar, Aditya Mathur:
Attacklets to Test Anomaly Detectors for Critical Infrastructure. 209-227
CIMSS - Critical Infrastructure and Manufacturing System Security
- Aleksei Kharitonov, Axel Zimmermann:
WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps. 231-251 - Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey:
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain. 252-275
Cloud S&P - Cloud Security and Privacy
- Pierre-Emmanuel Clet, Oana Stan, Martin Zuber:
BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud? 279-300 - Abdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu:
Memory Deduplication as a Protective Factor in Virtualized Systems. 301-317
SCI -Secure Cryptographic Implementation
- Florian Caullery:
A (Bit)slice of Rainbow. 321-331 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security. 332-345 - Shuihai Zhang, Jingfu Wang, Yan Zhang, Bei Pei, Chunli Lyu:
An Efficient Proactive Secret Sharing Scheme for Cloud Storage. 346-357 - Aozhuo Sun, Bingyu Li, Huiqing Wan, Qiongxiao Wang:
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor. 358-377 - Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Takahiro Matsuda, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures. 378-396 - Niusen Chen, Wen Xie, Bo Chen:
Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography. 397-413
SecMT - Security in Mobile Technologies
- Aïda Diop, Nicolas Desmoulins, Jacques Traoré:
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass. 417-435
SiMLA - Security in Machine Learning and Its Applications
- Zihao Qin, Hsiao-Ying Lin, Jie Shi:
Towards Demystifying Adversarial Robustness of Binarized Neural Networks. 439-462 - Yogesh Kulkarni, Krisha Bhambani:
Kryptonite: An Adversarial Attack Using Regional Focus. 463-481
Posters
- Laetitia Debesse, Sihem Mesnager, Mounira Msahli:
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack. 485-489 - Yongjin Kim:
POSTER: LHSA: Lightweight Hardware Security Arbitrator. 490-494 - Anubhab Baksi, Banashri Karmakar, Vishnu Asutosh Dasu:
POSTER: Another Look at Boyar-Peralta's Algorithm. 495-499 - Anubhab Baksi, Banashri Karmakar, Vishnu Asutosh Dasu:
POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools. 500-504
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.