Login / Signup
STM
2006
2012
2016
2023
2006
2023
Keyphrases
Publications
2023
Emiliia Nazarenko
,
Felix Klement
,
Eva Gründinger
,
Stefan Katzenbeisser
Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things.
STM
(2023)
Tobias Hilbig
,
Thomas Schreck
,
Tobias Limmer
'State of the Union': Evaluating Open Source Zero Trust Components.
STM
(2023)
Marietjie Botes
Consent as Mechanism to Preserve Information Privacy: Its Origin, Evolution, and Current Relevance.
STM
(2023)
Ivone Amorim
,
Pedro Barbosa
,
Eva Maia
,
Isabel Praça
Privacy-Preserving NN for IDS: A Study on the Impact of TFHE Restrictions.
STM
(2023)
Isaac Henderson Johnson Jeyakumar
,
John Walker
,
Heiko Roßnagel
Decentralized Global Trust Registry Platform for Trust Discovery and Verification of e-Health Credentials Using TRAIN: COVID-19 Certificate Use Case.
STM
(2023)
Jan Willemson
Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System.
STM
(2023)
Pavel V. Kolesnichenko
,
Dmytro Progonov
,
Valentyna Cherniakova
,
Andriy Oliynyk
,
Oleksandra Sokol
Biometric-Based Password Management.
STM
(2023)
Lydia Ouaili
Impact of Consensus Protocols on the Efficiency of Registration and Authentication Process in Self-sovereign Identity.
STM
(2023)
Henrich C. Pöhls
Towards a Unified Abstract Architecture to Coherently and Generically Describe Security Goals and Risks of AI Systems.
STM
(2023)
volume 14336, 2023
Security and Trust Management - 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings
STM
14336 (2023)
volume 13867, 2023
Security and Trust Management - 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings
STM
13867 (2023)
2022
Chris Hicks
,
Vasilios Mavroudis
,
Jon Crowcroft
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries.
STM
(2022)
Marietjie Botes
The Relevance of Consent in the Digital Age: A Consideration of Its Origins and Its Fit for Digital Application.
STM
(2022)
Pascal Oser
,
Felix Engelmann
,
Stefan Lüders
,
Frank Kargl
Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices.
STM
(2022)
Pan Wang
,
Zeyi Li
,
Xiaokang Zhou
,
Chunhua Su
,
Weizheng Wang
FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection.
STM
(2022)
Giacomo Iadarola
,
Francesco Mercaldo
,
Fabio Martinelli
,
Antonella Santone
Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps.
STM
(2022)
Xin Zhou
,
Rakesh M. Verma
Software Vulnerability Detection via Multimodal Deep Learning.
STM
(2022)
Fangyi Yu
,
Miguel Vargas Martin
HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks.
STM
(2022)
Johanna Maria Kirss
,
Peeter Laud
,
Nikita Snetkov
,
Jelizaveta Vakarjuk
Server-Supported Decryption for Mobile Devices.
STM
(2022)
Yanmin Zhao
,
Yang Wang
,
Siu Ming Yiu
,
Yu Liu
,
Meiqin Wang
A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions.
STM
(2022)
Luca Buccioli
,
Stefano Cristalli
,
Edoardo Vignati
,
Lorenzo Nava
,
Daniele Badagliacca
,
Danilo Bruschi
,
Long Lu
,
Andrea Lanzi
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language.
STM
(2022)
Florimond Houssiau
,
Vincent Schellekens
,
Antoine Chatalic
,
Shreyas Kumar Annamraju
,
Yves-Alexandre de Montjoye
M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch.
STM
(2022)
2021
Korbinian Spielvogel
,
Henrich C. Pöhls
,
Joachim Posegga
TLS Beyond the Broker: Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT.
STM
(2021)
Georgios Fotiadis
,
José Moreira
,
Thanassis Giannetsos
,
Liqun Chen
,
Peter B. Rønne
,
Mark Ryan
,
Peter Y. A. Ryan
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
STM
(2021)
Peeter Laud
Efficient Permutation Protocol for MPC in the Head.
STM
(2021)
Robert Abela
,
Christian Colombo
,
Peter Malo
,
Peter Sýs
,
Tomás Fabsic
,
Ondrej Gallo
,
Viliam Hromada
,
Mark Vella
Secure Implementation of a Quantum-Future GAKE Protocol.
STM
(2021)
Joud Khoury
,
Zachary B. Ratliff
,
Michael Atighetchi
Towards Decentralized and Provably Secure Cross-Domain Solutions.
STM
(2021)
Yongge Wang
The Adversary Capabilities in Practical Byzantine Fault Tolerance.
STM
(2021)
Alireza Kavousi
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
Efficient Scalable Multi-party Private Set Intersection Using Oblivious PRF.
STM
(2021)
Masayuki Fukumitsu
,
Shingo Hasegawa
An Aggregate Signature with Pre-communication in the Plain Public Key Model.
STM
(2021)
Laouen Fernet
,
Sebastian Mödersheim
Deciding a Fragment of (α , β )-Privacy.
STM
(2021)
Yifei Chen
,
Meng Li
,
Shuli Zheng
,
Chhagan Lal
,
Mauro Conti
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
STM
(2021)
volume 13075, 2021
Security and Trust Management - 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings
STM
13075 (2021)
2020
Karim Baghery
Subversion-Resistant Commitment Schemes: Definitions and Constructions.
STM
(2020)
Eden Abadi
,
Itay Hazan
Improved Feature Engineering for Free-Text Keystroke Dynamics.
STM
(2020)
Aynesh Sundararaj
,
Silvia Knittl
,
Jens Grossklags
Challenges in IT Security Processes and Solution Approaches with Process Mining.
STM
(2020)
Yonas Leguesse
,
Mark Vella
,
Christian Colombo
,
Julio C. Hernandez-Castro
Reducing the Forensic Footprint with Android Accessibility Attacks.
STM
(2020)
Vishal Arora
,
Manoj Misra
A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time.
STM
(2020)
Rajiv Ranjan Singh
,
José Moreira
,
Tom Chothia
,
Mark Dermot Ryan
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties.
STM
(2020)
Paul Georg Wagner
,
Pascal Birnstill
,
Jürgen Beyerer
Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0.
STM
(2020)
Fabian Schillinger
,
Christian Schindelhauer
Revocable Access to Encrypted Message Boards.
STM
(2020)
volume 12386, 2020
Security and Trust Management - 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings
STM
12386 (2020)
2019
Karin Bernsmed
,
Martin Gilje Jaatun
,
Christian Frøystad
Is a Smarter Grid Also Riskier?
STM
(2019)
Umberto Morelli
,
Silvio Ranise
,
Damiano Sartori
,
Giada Sciarretta
,
Alessandro Tomasi
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations.
STM
(2019)
Paul Georg Wagner
,
Pascal Birnstill
,
Jürgen Beyerer
Challenges of Using Trusted Computing for Collaborative Data Processing.
STM
(2019)
Stelvio Cimato
,
Valentina Ciriani
,
Ernesto Damiani
,
Maryam Ehsanpour
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits.
STM
(2019)
Johannes Blömer
,
Nils Löken
Personal Cross-Platform Reputation.
STM
(2019)
Fatih Balli
,
F. Betül Durak
,
Serge Vaudenay
BioID: A Privacy-Friendly Identity Document.
STM
(2019)
Jule Anna Ziegler
,
Michael Schmidt
,
Mikael Linden
Improving Identity and Authentication Assurance in Research & Education Federations.
STM
(2019)
volume 11738, 2019
Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings
STM
11738 (2019)