default search action
26th ISC 2023: Groningen, The Netherlands
- Elias Athanasopoulos, Bart Mennink:
Information Security - 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings. Lecture Notes in Computer Science 14411, Springer 2023, ISBN 978-3-031-49186-3
Privacy
- Manel Slokom, Peter-Paul de Wolf, Martha A. Larson:
Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks. 3-23 - Pronaya Prosun Das, Despina Tawadros, Lena Wiese:
Privacy-Preserving Medical Data Generation Using Adversarial Learning. 24-41 - Bingchang He, Atsuko Miyaji:
Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning. 42-56
Intrusion Detection and Systems
- Songyue Chen, Rong Yang, Hong Zhang, Hongwei Wu, Yanqin Zheng, Xingyu Fu, Qingyun Liu:
SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection. 59-78 - Yan Lin Aung, Shanshan Wang, Wang Cheng, Sudipta Chattopadhyay, Jianying Zhou, Anyu Cheng:
VNGuard: Intrusion Detection System for In-Vehicle Networks. 79-98 - Wei Chen, Huaijin Wang, Weixi Gu, Shuai Wang:
RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing. 99-118
Machine Learning
- Hailong Hu, Jun Pang:
Loss and Likelihood Based Membership Inference of Diffusion Models. 121-141 - Blerta Lindqvist:
Symmetry Defense Against CNN Adversarial Perturbation Attacks. 142-160
Web Security
- Nico Weidmann, Thomas Barber, Christian Wressnegger:
Load-and-Act: Increasing Page Coverage of Web Applications. 163-182 - Valerio Bucci, Wanpeng Li:
From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions. 183-202
Mobile Security and Trusted Execution
- David A. Tomassi, Kenechukwu Nwodo, Mohamed Elsabagh:
Libra: Library Identification in Obfuscated Android Apps. 205-225 - Fatemeh Nezhadian, Enrico Branca, Natalia Stakhanova:
Certificate Reuse in Android Applications. 226-245 - Gilang Mentari Hamidy, Sri Yulianti, Pieter Philippaerts, Wouter Joosen:
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. 246-264
Post-Quantum Cryptography
- Johanna Henrich, Andreas Heinemann, Alexander Wiesmaier, Nicolai Schmitt:
Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics. 267-287 - Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin:
Protecting Private Keys of Dilithium Using Hardware Transactional Memory. 288-306
Multiparty Computation
- Luke Harmon, Gaetan Delavignette:
Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals. 309-326 - Naty Peter:
Evolving Conditional Disclosure of Secrets. 327-347
Symmetric Cryptography
- Yukihito Hiraga, Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size. 351-371 - Jiqiang Lu, Xiao Zhang:
Impossible Differential Cryptanalysis of the FBC Block Cipher. 372-391 - Benqiang Wei, Ruida Wang, Zhihao Li, Qinju Liu, Xianhui Lu:
Fregata: Faster Homomorphic Evaluation of AES via TFHE. 392-412
Key Management
- Li Duan, Yong Li, Lijun Liao:
Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography. 415-434 - Li Duan, Yong Li:
On the Privacy-Preserving Infrastructure for Authenticated Key Exchange. 435-454 - Colin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord:
Hybrid Group Key Exchange with Application to Constrained Networks. 455-472
Functional and Updatable Encryption
- Jodie Knapp, Elizabeth A. Quaglia:
Dynamic Multi-server Updatable Encryption. 475-495 - Qiuwei Zheng, Jun Zhao:
Trace-and-Revoke Quadratic Functional Encryption. 496-515 - Ming Wan, Geng Wang, Shifeng Sun, Dawu Gu:
Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings. 516-534
Signatures, Hashes, and Cryptanalysis
- Keyang Liu, Xingxin Li, Tsuyoshi Takagi:
Robust Property-Preserving Hash Meets Homomorphism. 537-556 - Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call Off a Signature. 557-577 - Yu Wei, Lei Bi, Kunpeng Wang, Xianhui Lu:
An Improved BKW Algorithm for Solving LWE with Small Secrets. 578-595
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.