default search action
14th FPS 2021: Paris, France
- Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquín García-Alfaro:
Foundations and Practice of Security - 14th International Symposium, FPS 2021, Paris, France, December 7-10, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13291, Springer 2022, ISBN 978-3-031-08146-0
Cryptography and Privacy
- Anis Bkakria, Reda Yaich, Walid Arabi:
Secure and Robust Cyber Security Threat Information Sharing. 3-18 - Adda-Akram Bendoukha, Aymen Boudguiga, Renaud Sirdey:
Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era. 19-33 - Xavier Bultel, Pascal Lafourcade, Charles Olivier-Anclin, Léo Robert:
Generic Construction for Identity-Based Proxy Blind Signature. 34-52 - Mathieu Jee, Ania M. Piotrowska, Harry Halpin, Ninoslav Marina:
Optimizing Anonymity and Performance in a Mix Network. 53-62 - Kalikinkar Mandal, Guang Gong:
Homomorphic Evaluation of Lightweight Cipher Boolean Circuits. 63-74 - Bodo Selmke, Emanuele Strieder, Johann Heyszl, Sven Freud, Tobias Damm:
Breaking Black Box Crypto-Devices Using Laser Fault Injection. 75-90
Authentication and Content Protection
- Ricardo Ávila, Raphaël Khoury, Christophe Pere, Kobra Khanmohammadi:
Employing Feature Selection to Improve the Performance of Intrusion Detection Systems. 93-112 - Yunjie Yi, Kalikinkar Mandal, Guang Gong:
Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission. 113-129 - Dylan Paulin, Christine Hennebert, Thibault Franco-Rondisson, Romain Jayles, Thomas Loubier, Raphaël Collado:
HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPM. 130-145 - Iulia Bastys, Pauline Bolignano, Franco Raimondi, Daniel Schoepe:
Automatic Annotation of Confidential Data in Java Code. 146-161 - Maikel Lázaro Pérez Gort, Martina Olliaro, Agostino Cortesi:
A Quantile-Based Watermarking Approach for Distortion Minimization. 162-176 - Sabrine Amri, Dorsaf Sallami, Esma Aïmeur:
EXMULF: An Explainable Multimodal Content-Based Fake News Detection System. 177-187
IoT Security
- João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa, Eva Maia:
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection. 191-207 - Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent:
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts. 208-217 - Sigurd Frej Joel Jørgensen Ankergård, Edlira Dushku, Nicola Dragoni:
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain. 218-234 - Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine:
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3. 235-252 - Armando Miguel Garcia, Matthias Hiller:
Lightweight Authentication and Encryption for Online Monitoring in IIoT Environments. 253-262
Attacks and Code Security
- Felix Heine, Carsten Kleiner, Philip Klostermeyer, Volker Ahlers, Tim Laue, Nils Wellermann:
Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator. 265-282 - Rania Taleb, Sylvain Hallé, Raphaël Khoury:
A Modular Runtime Enforcement Model Using Multi-traces. 283-302 - Yaëlle Vinçont, Sébastien Bardin, Michaël Marcozzi:
A Tight Integration of Symbolic Execution and Fuzzing (Short Paper). 303-310 - Guillaume Bonfante, Alexandre Talon:
At the Bottom of Binary Analysis: Instructions. 311-320 - Marwa Ziadia, Mohamed Mejri, Jaouhar Fattahi:
$\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications. 321-337
Defense and Analysis
- S. Seng, Joaquín García-Alfaro, Youssef Laarouchi:
Why Anomaly-Based Intrusion Detection Systems Have Not Yet Conquered the Industrial Market? 341-354 - Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, Andreas Schaad, Felix Schmieder:
Creation and Detection of German Voice Deepfakes. 355-364 - Carla Mascia, Silvio Ranise:
Asset Sensitivity for Aligning Risk Assessment Across Multiple Units in Complex Organizations. 365-375 - Anubhav Chhabra, Paula Branco, Guy-Vincent Jourdan, Herna L. Viktor:
An Extensive Comparison of Systems for Entity Extraction from Log Files. 376-392 - Hazel Murray, David Malone:
Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit Approach. 393-413
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.