Login / Signup
ICETE (2)
2004
2010
2014
2020
2004
2020
Keyphrases
Publications
2020
Josselin Mignerey
,
Cyrille Mucchietto
,
Jean-Baptiste Orfila
Ensuring the Integrity of Outsourced Web Scripts.
ICETE (2)
(2020)
Peter Amthor
,
Marius Schlegel
Towards Language Support for Model-based Security Policy Engineering.
ICETE (2)
(2020)
Mohamad El Laz
,
Benjamin Grégoire
,
Tamara Rezk
Security Analysis of ElGamal Implementations.
ICETE (2)
(2020)
Jing Yao
,
Yifeng Zheng
,
Cong Wang
,
Surya Nepal
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness.
ICETE (2)
(2020)
Cédric Herzog
,
Valérie Viet Triem Tong
,
Pierre Wilke
,
Arnaud Van Straaten
,
Jean-Louis Lanet
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures.
ICETE (2)
(2020)
Pascal Lafourcade
,
Léo Robert
,
Demba Sow
Linear Generalized ElGamal Encryption Scheme.
ICETE (2)
(2020)
Peter Maynard
,
Kieran McLaughlin
Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks.
ICETE (2)
(2020)
Oana Stan
,
Loïc Cudennec
,
Louis Syoën
Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory.
ICETE (2)
(2020)
Julián Salas
,
Vicenç Torra
Differentially Private Graph Publishing and Randomized Response for Collaborative Filtering.
ICETE (2)
(2020)
Mohamed Nassar
,
Elie Chicha
,
Bechara al Bouna
,
Richard Chbeir
VIP Blowfish Privacy in Communication Graphs.
ICETE (2)
(2020)
Christian Tietz
,
Eric Klieme
,
Rachel Brabender
,
Teresa Lasarow
,
Lukas Rambold
,
Christoph Meinel
Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room Entry.
ICETE (2)
(2020)
Hamza Hammami
,
Mohammad S. Obaidat
,
Sadok Ben Yahia
An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data.
ICETE (2)
(2020)
Lamine Aouad
,
Muhammad Rizwan Asghar
Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment.
ICETE (2)
(2020)
Georg Bramm
,
Julian Schütte
cipherPath: Efficient Traversals over Homomorphically Encrypted Paths.
ICETE (2)
(2020)
Elías Grande
,
Marta Beltrán
Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices.
ICETE (2)
(2020)
Thomas Lorünser
,
Florian Wohner
Performance Comparison of Two Generic MPC-frameworks with Symmetric Ciphers.
ICETE (2)
(2020)
Sigurd Eskeland
Privacy-Preserving Greater-Than Integer Comparison without Binary Decomposition.
ICETE (2)
(2020)
Anne Borcherding
,
Steffen Pfrang
,
Christian Haas
,
Albrecht Weiche
,
Jürgen Beyerer
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems.
ICETE (2)
(2020)
Sondes Ksibi
,
Faouzi Jaïdi
,
Adel Bouhoula
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems.
ICETE (2)
(2020)
Markus Brandt
,
Claudio Orlandi
,
Kris Shrishak
,
Haya Shulman
Optimal Transport Layer for Secure Computation.
ICETE (2)
(2020)
M. A. Haytom
,
Christophe Rosenberger
,
Christophe Charrier
,
C. Zhu
,
C. Regnier
Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric System.
ICETE (2)
(2020)
Louis Tajan
,
Dirk Westhoff
,
Frederik Armknecht
Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private.
ICETE (2)
(2020)
Arnolnt Spyros
,
Konstantinos Rantos
,
Alexandros Papanikolaou
,
Christos Ilioudis
An Innovative Self-Healing Approach with STIX Data Utilisation.
ICETE (2)
(2020)
Sana Belguith
,
Muhammad Rizwan Asghar
,
Song Wang
,
Karina Mabell Gomez
,
Giovanni Russello
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks.
ICETE (2)
(2020)
Puneet Bakshi
,
Sukumar Nandi
Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption.
ICETE (2)
(2020)
Marco Baldi
,
Alessandro Barenghi
,
Franco Chiaraluce
,
Gerardo Pelosi
,
Paolo Santini
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems.
ICETE (2)
(2020)
Michael Ekonde Sone
FPGA-based McEliece Cryptosystem using Non-linear Convolutional Codes.
ICETE (2)
(2020)
Zsolt Tujner
,
Thomas Rooijakkers
,
Maran van Heesch
,
Melek Önen
QSOR: Quantum-safe Onion Routing.
ICETE (2)
(2020)
Beyza Bozdemir
,
Orhan Ermis
,
Melek Önen
ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications.
ICETE (2)
(2020)
Satoshi Obana
,
Maki Yoshida
Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing.
ICETE (2)
(2020)
Dominik Ziegler
,
Alexander Marsalek
,
Bernd Prünster
,
Josef Sabongui
Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption.
ICETE (2)
(2020)
Nicolas Aragon
,
Olivier Blazy
,
Neals Fournaise
,
Philippe Gaborit
CROOT: Code-based Round-Optimal Oblivious Transfer.
ICETE (2)
(2020)
Christophe Nègre
Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure.
ICETE (2)
(2020)
Ferucio Laurentiu Tiplea
,
Alexandru Ionita
,
Anca-Maria Nica
Practically Efficient Attribute-based Encryption for Compartmented Access Structures.
ICETE (2)
(2020)
Hossein Shirazi
,
Landon Zweigle
,
Indrakshi Ray
A Machine-learning based Unbiased Phishing Detection Approach.
ICETE (2)
(2020)
Thomas Genet
,
Thomas P. Jensen
,
Justine Sauvage
Termination of Ethereum's Smart Contracts.
ICETE (2)
(2020)
Olivier Blazy
,
Laura Brouilhet
,
Céline Chevalier
,
Neals Fournaise
Round-optimal Constant-size Blind Signatures.
ICETE (2)
(2020)
Luís Fiolhais
,
Paulo Martins
,
Leonel Sousa
Software Emulation of Quantum Resistant Trusted Platform Modules.
ICETE (2)
(2020)
Itzel Vázquez Sandoval
,
Arash Atashpendar
,
Gabriele Lenzini
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets.
ICETE (2)
(2020)
Levent Demir
,
Mathieu Thiery
,
Vincent Roca
,
Jean-Michel Tenkes
,
Jean-Louis Roch
Optimizing dm-crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-processors.
ICETE (2)
(2020)
Oussama Trabelsi
,
Lilia Sfaxi
,
Riadh Robbana
DCBC: A Distributed High-performance Block-Cipher Mode of Operation.
ICETE (2)
(2020)
George Stergiopoulos
,
Eirini Lygerou
,
Nikolaos Tsalis
,
Dimitris Tomaras
,
Dimitris Gritzalis
Avoiding Network and Host Detection using Packet Bit-masking.
ICETE (2)
(2020)
Marco Anisetti
,
Claudio Agostino Ardagna
,
Nicola Bena
,
Ernesto Damiani
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems.
ICETE (2)
(2020)
John Korniotakis
,
Panagiotis Papadopoulos
,
Evangelos P. Markatos
Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes.
ICETE (2)
(2020)
Nishant Raj
,
Alwyn Roshan Pais
CP-ABE Scheme Satisfying Constant-size Keys based on ECC.
ICETE (2)
(2020)
Haotian Weng
,
Artem Lenskiy
A Trend-following Trading Indicator on Homomorphically Encrypted Data.
ICETE (2)
(2020)
Emina Ahmetovic
,
Thomas Lenz
,
Christian Kollmann
Signatures to Go: A Framework for Qualified PDF Signing on Mobile Devices.
ICETE (2)
(2020)
Paul Marillonnet
,
Mikaël Ates
,
Maryline Laurent
,
Nesrine Kaaniche
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures.
ICETE (2)
(2020)
Sandra Rasoamiaramanana
,
Marine Minier
,
Gilles Macario-Rat
A White-Box Encryption Scheme using Physically Unclonable Functions.
ICETE (2)
(2020)
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020.
ICETE (2)
(2020)