default search action
22nd ICICS 2020: Copenhagen, Denmark
- Weizhi Meng, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou:
Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12282, Springer 2020, ISBN 978-3-030-61077-7
Security I
- Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. 3-19 - Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. 20-35 - Erik Bergenholtz, Emiliano Casalicchio, Dragos Ilie, Andrew Moss:
Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks. 36-53 - Anisa Halimi, Erman Ayday:
Profile Matching Across Online Social Networks. 54-70
Crypto I
- Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. 73-90 - Hector B. Hougaard, Atsuko Miyaji:
Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity. 91-106 - Jie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang:
CoinBot: A Covert Botnet in the Cryptocurrency Network. 107-125 - Shiwei Xu, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Yan Tong, Huanguo Zhang:
A Symbolic Model for Systematically Analyzing TEE-Based Protocols. 126-144
Crypto II
- Yanmei Cao, Fangguo Zhang, Chongzhi Gao, Xiaofeng Chen:
New Practical Public-Key Deniable Encryption. 147-163 - Tianjun Ma, Haixia Xu, Peili Li:
A Blockchain Traceable Scheme with Oversight Function. 164-182 - Sébastien Canard, Adel Hamdi, Fabien Laguillaumie:
Blind Functional Encryption. 183-201 - Guofeng Tang, Tian Qiu:
Lattice HIBE with Faster Trapdoor Delegation and Applications. 202-220
Security II
- Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. 223-242 - Koen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis, Nicola Dragoni:
rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices. 243-258 - Qingjia Huang, Haiming Li, Yun He, Jianwei Tai, Xiaoqi Jia:
PiDicators: An Efficient Artifact to Detect Various VMs. 259-275 - Luis S. Kida, Soham Jayesh Desai, Alpa Trivedi, Reshma Lal, Vincent Scarlata, Santosh Ghosh:
HCC: 100 Gbps AES-GCM Encrypted Inline DMA Transfers Between SGX Enclave and FPGA Accelerator. 276-291
Crypto III
- Marc Fischlin, Felix Günther, Philipp Muth:
Information-Theoretic Security of Cryptographic Channels. 295-311 - Gareth T. Davies, Christian Janson, Daniel P. Martin:
Client-Oblivious OPRAM. 312-330 - Georg Maringer, Tim Fritzmann, Johanna Sepúlveda:
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. 331-349 - Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. 350-365
Crypto IV
- Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. 369-385 - George Teseleanu:
A Love Affair Between Bias Amplifiers and Broken Noise Sources. 386-402 - Martin Zuber, Sergiu Carpov, Renaud Sirdey:
Towards Real-Time Hidden Speaker Recognition by Means of Fully Homomorphic Encryption. 403-421 - Jintai Ding, Zheng Zhang, Joshua Deaton, Lih-Chung Wang:
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3. 422-440
Security III
- Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, David Mohaisen:
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. 443-461 - Florian Fischer, Matthias Niedermaier, Thomas Hanka, Peter Knauer, Dominik Merli:
Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks. 462-478 - Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang:
A Variational Generative Network Based Network Threat Situation Assessment. 479-491
Crypto V
- Sebastian Renner, Enrico Pozzobon, Jürgen Mottok:
A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers. 495-509 - Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang:
Experimental Comparisons of Verifiable Delay Functions. 510-527 - Alessandro Budroni, Benjamin Chetioui, Ermes Franch:
Attacks on Integer-RLWE. 528-542 - Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta:
A Family of Subfield Hyperelliptic Curves for Use in Cryptography. 543-561
Crypto VI
- Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model. 565-587 - Kaiming Chen, Jiageng Chen:
Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree. 588-605
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.