default search action
17th ICETE 2020: Paris, France - Volume 2
- Pierangela Samarati, Sabrina De Capitani di Vimercati, Mohammad S. Obaidat, Jalel Ben-Othman:
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020. ScitePress 2020, ISBN 978-989-758-446-6
Invited Speakers
- Henderik A. Proper:
Enterprise Systems Architecture - Essentials. ICETE (1) 2020: 5-6 - Marta Botella-Campos, Sandra Viciano-Tudela, Sandra Sendra, Jaime Lloret:
Non-invasive Wireless Mobile System for COVID-19 Monitoring in Nursing Homes. ICETE (1) 2020: 7-16 - Ajith Abraham:
Industry 4.0: Challenges from a Data Science Perspective. ICETE (1) 2020: 17 - Moti Yung:
Secure Computation Protocol: A Technology for Our Time. ICETE (1) 2020: 19 - Ingemar Johansson Cox:
Analysing Digital Footprints to Infer the Health of Populations and Individuals. ICETE (1) 2020: 21
Papers
- Anne Borcherding, Steffen Pfrang, Christian Haas, Albrecht Weiche, Jürgen Beyerer:
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems. 27-38 - Thomas Genet, Thomas P. Jensen, Justine Sauvage:
Termination of Ethereum's Smart Contracts. 39-51 - George Stergiopoulos, Eirini Lygerou, Nikolaos Tsalis, Dimitris Tomaras, Dimitris Gritzalis:
Avoiding Network and Host Detection using Packet Bit-masking. 52-63 - Michael Ekonde Sone:
FPGA-based McEliece Cryptosystem using Non-linear Convolutional Codes. 64-75 - Nicolas Aragon, Olivier Blazy, Neals Fournaise, Philippe Gaborit:
CROOT: Code-based Round-Optimal Oblivious Transfer. 76-85 - Oussama Trabelsi, Lilia Sfaxi, Riadh Robbana:
DCBC: A Distributed High-performance Block-Cipher Mode of Operation. 86-97 - Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani:
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems. 98-109 - Hamza Hammami, Mohammad S. Obaidat, Sadok Ben Yahia:
An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data. 110-117 - Yuechen Chen, Linru Zhang, Siu-Ming Yiu:
Decentralized Multi-Client Attribute Based Functional Encryption. 118-129 - Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Optimal Transport Layer for Secure Computation. 130-141 - Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche:
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures. 142-154 - Josselin Mignerey, Cyrille Mucchietto, Jean-Baptiste Orfila:
Ensuring the Integrity of Outsourced Web Scripts. 155-166 - Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini:
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets. 167-179 - Chih-Chun Liu, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:
FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints. 180-191 - John Korniotakis, Panagiotis Papadopoulos, Evangelos P. Markatos:
Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes. 192-200 - Ferucio Laurentiu Tiplea, Alexandru Ionita, Anca-Maria Nica:
Practically Efficient Attribute-based Encryption for Compartmented Access Structures. 201-212 - Olivier Blazy, Laura Brouilhet, Céline Chevalier, Neals Fournaise:
Round-optimal Constant-size Blind Signatures. 213-224 - Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello:
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. 225-237 - Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems. 238-249 - Lukás Zobal, Dusan Kolár, Jakub Kroustek:
Exploring Current E-mail Cyber Threats using Authenticated SMTP Honeypot. 253-262 - Levent Demir, Mathieu Thiery, Vincent Roca, Jean-Michel Tenkes, Jean-Louis Roch:
Optimizing dm-crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-processors. 263-270 - Georg Bramm, Julian Schütte:
cipherPath: Efficient Traversals over Homomorphically Encrypted Paths. 271-278 - Sandra Rasoamiaramanana, Marine Minier, Gilles Macario-Rat:
A White-Box Encryption Scheme using Physically Unclonable Functions. 279-286 - Peter Maynard, Kieran McLaughlin:
Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks. 287-294 - Jing Yao, Yifeng Zheng, Cong Wang, Surya Nepal:
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness. 295-301 - Cédric Herzog, Valérie Viet Triem Tong, Pierre Wilke, Arnaud Van Straaten, Jean-Louis Lanet:
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures. 302-309 - Mohamad El Laz, Benjamin Grégoire, Tamara Rezk:
Security Analysis of ElGamal Implementations. 310-321 - Satoshi Obana, Maki Yoshida:
Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing. 322-329 - Emina Ahmetovic, Thomas Lenz, Christian Kollmann:
Signatures to Go: A Framework for Qualified PDF Signing on Mobile Devices. 330-339 - Sigurd Eskeland:
Privacy-Preserving Greater-Than Integer Comparison without Binary Decomposition. 340-348 - Majid Mollaeefar, Alberto Siena, Silvio Ranise:
Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection. 349-356 - Hamza Hammami, Mohammad S. Obaidat, Sadok Ben Yahia:
A Novel Anonymous Authentication and Key Agreement Scheme for Smart Grid. 357-362 - Bojan Spasic, Olivier Markowitch, Philippe Thiran:
SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor Networks. 363-371 - Pascal Lafourcade, Léo Robert, Demba Sow:
Linear Generalized ElGamal Encryption Scheme. 372-379 - Shabnam Khanna, Ciara Rafferty:
Accelerating Homomorphic Encryption using Approximate Computing Techniques. 380-387 - Alexander Marsalek, Edona Fasllija, Dominik Ziegler:
This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining. 388-396 - Beyza Bozdemir, Orhan Ermis, Melek Önen:
ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications. 397-404 - Nathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, Jean Leneutre:
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting. 405-414 - Julián Salas, Vicenç Torra:
Differentially Private Graph Publishing and Randomized Response for Collaborative Filtering. 415-422 - Hossein Shirazi, Landon Zweigle, Indrakshi Ray:
A Machine-learning based Unbiased Phishing Detection Approach. 423-430 - Marius Schlegel, Peter Amthor:
Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies. 431-442 - Louis Tajan, Dirk Westhoff, Frederik Armknecht:
Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private. 443-450 - M. A. Haytom, Christophe Rosenberger, Christophe Charrier, C. Zhu, C. Regnier:
Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric System. 451-458 - Mohamed Nassar, Elie Chicha, Bechara al Bouna, Richard Chbeir:
VIP Blowfish Privacy in Communication Graphs. 459-467 - Przemyslaw Blaskiewicz, Marek Klonowski, Piotr Syga:
Droppix: Towards More Realistic Video Fingerprinting. 468-476 - Luís Fiolhais, Paulo Martins, Leonel Sousa:
Software Emulation of Quantum Resistant Trusted Platform Modules. 477-484 - Shoukat Ali, Koray Karabina, Emrah Karagoz:
Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation. 485-496 - Gamze Tillem, Beyza Bozdemir, Melek Önen:
SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network Predictions. 497-504 - Harry Halpin:
Deconstructing the Decentralization Trilemma. 505-512 - Peter Amthor, Marius Schlegel:
Towards Language Support for Model-based Security Policy Engineering. 513-521 - Marius Schlegel, Winfried E. Kühnhauser:
Exploiting Hot Spots in Heuristic Safety Analysis of Dynamic Access Control Models. 522-532 - Nishant Raj, Alwyn Roshan Pais:
CP-ABE Scheme Satisfying Constant-size Keys based on ECC. 535-540 - Puneet Bakshi, Sukumar Nandi:
Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption. 541-546 - Dominik Ziegler, Alexander Marsalek, Bernd Prünster, Josef Sabongui:
Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption. 547-552 - Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. 553-558 - Elías Grande, Marta Beltrán:
Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices. 559-564 - Christian Tietz, Eric Klieme, Rachel Brabender, Teresa Lasarow, Lukas Rambold, Christoph Meinel:
Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room Entry. 565-571 - Junade Ali, Vladimir Dyo:
Practical Hash-based Anonymity for MAC Addresses. 572-579 - Lamine Aouad, Muhammad Rizwan Asghar:
Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment. 580-586 - Thomas Lorünser, Florian Wohner:
Performance Comparison of Two Generic MPC-frameworks with Symmetric Ciphers. 587-594 - Marco Valzelli, Andrea Maurino, Matteo Palmonari:
A Fine-grained Access Control Model for Knowledge Graphs. 595-601 - Haotian Weng, Artem Lenskiy:
A Trend-following Trading Indicator on Homomorphically Encrypted Data. 602-607 - Sana Belguith, Muhammad Rizwan Asghar, Song Wang, Karina Mabell Gomez, Giovanni Russello:
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks. 608-617 - Zsolt Tujner, Thomas Rooijakkers, Maran van Heesch, Melek Önen:
QSOR: Quantum-safe Onion Routing. 618-624 - Oana Stan, Loïc Cudennec, Louis Syoën:
Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory. 625-631 - Christophe Nègre:
Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure. 632-637 - Abubakar-Sadiq Shehu, António Pinto, Manuel Eduardo Correia:
Providing Secured Access Delegation in Identity Management Systems. 638-644 - Arnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou, Christos Ilioudis:
An Innovative Self-Healing Approach with STIX Data Utilisation. 645-651 - Sondes Ksibi, Faouzi Jaïdi, Adel Bouhoula:
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems. 652-657
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.