Sign in
ACNS (2)
2020
2021
2020
2021
Keyphrases
Publications
2021
Yaron Gvili
,
Julie Ha
,
Sarah Scheffler
,
Mayank Varia
,
Ziling Yang
,
Xinyuan Zhang
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-quantum Signatures.
ACNS (2)
(2021)
Ruben Groot Roessink
,
Andreas Peter
,
Florian Hahn
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.
ACNS (2)
(2021)
F. W. Dekker
,
Zekeriya Erkin
Privacy-Preserving Data Aggregation with Probabilistic Range Validation.
ACNS (2)
(2021)
Andy Russon
Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library.
ACNS (2)
(2021)
David Cash
,
Ruth Ng
,
Adam Rivkin
Improved Structured Encryption for SQL Databases via Hybrid Indexing.
ACNS (2)
(2021)
Shuangpeng Bai
,
Hui Wen
,
Dongliang Fang
,
Yue Sun
,
Puzhuo Liu
,
Limin Sun
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.
ACNS (2)
(2021)
Mark Abspoel
,
Anders P. K. Dalskov
,
Daniel Escudero
,
Ariel Nof
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings.
ACNS (2)
(2021)
Sonia Bogos
,
Dario Korolija
,
Thomas Locher
,
Serge Vaudenay
Towards Efficient LPN-Based Symmetric Encryption.
ACNS (2)
(2021)
Tim Heldmann
,
Thomas Schneider
,
Oleksandr Tkachenko
,
Christian Weinert
,
Hossein Yalame
LLVM-Based Circuit Compilation for Practical Secure Computation.
ACNS (2)
(2021)
Thales Bandiera Paiva
,
Routo Terada
Cryptanalysis of the Binary Permuted Kernel Problem.
ACNS (2)
(2021)
Panagiotis Chatzigiannis
,
Foteini Baldimtsi
,
Konstantinos Chalkias
SoK: Auditability and Accountability in Distributed Payment Systems.
ACNS (2)
(2021)
Yuede Ji
,
Lei Cui
,
H. Howie Huang
Vestige: Identifying Binary Code Provenance for Vulnerability Detection.
ACNS (2)
(2021)
Qian Cui
,
Guy-Vincent Jourdan
,
Gregor v. Bochmann
,
Iosif-Viorel Onut
Proactive Detection of Phishing Kit Traffic.
ACNS (2)
(2021)
Hannah Davis
,
Felix Günther
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.
ACNS (2)
(2021)
Stéphanie Delaune
,
Patrick Derbez
,
Paul Huynh
,
Marine Minier
,
Victor Mollimard
,
Charles Prud'homme
Efficient Methods to Search for Best Differential Characteristics on SKINNY.
ACNS (2)
(2021)
Manohar Raavi
,
Simeon Wuthier
,
Pranav Chandramouli
,
Yaroslav Balytskyi
,
Xiaobo Zhou
,
Sang-Yoon Chang
Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms.
ACNS (2)
(2021)
Rogério V. M. Rocha
,
Pedro Paulo Libório
,
Harsh Kupwade Patil
,
Diego F. Aranha
A Differentially Private Hybrid Approach to Traffic Monitoring.
ACNS (2)
(2021)
Rajat Tandon
,
Abhinav Palia
,
Jaydeep Ramani
,
Brandon Paulsen
,
Genevieve Bartlett
,
Jelena Mirkovic
Defending Web Servers Against Flash Crowd Attacks.
ACNS (2)
(2021)
Shangcheng Shi
,
Xianbo Wang
,
Wing Cheong Lau
Breaking and Fixing Third-Party Payment Service for Mobile Apps.
ACNS (2)
(2021)
volume 12727, 2021
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II
ACNS (2)
12727 (2021)
2020
Stefan Hoffmann
,
Jens Müller
,
Jörg Schwenk
,
Gerd Bumiller
Powerless Security.
ACNS (2)
(2020)
Maximilian Hils
,
Rainer Böhme
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069.
ACNS (2)
(2020)
Peter Fenteany
,
Benjamin Fuller
Same Point Composable and Nonmalleable Obfuscated Point Functions.
ACNS (2)
(2020)
Fabio De Gaspari
,
Dorjan Hitaj
,
Giulio Pagnotta
,
Lorenzo De Carli
,
Luigi V. Mancini
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes.
ACNS (2)
(2020)
Joyanta Debnath
,
Sze Yiu Chau
,
Omar Chowdhury
When TLS Meets Proxy on Mobile.
ACNS (2)
(2020)
Nihal Vatandas
,
Rosario Gennaro
,
Bertrand Ithurburn
,
Hugo Krawczyk
On the Cryptographic Deniability of the Signal Protocol.
ACNS (2)
(2020)
Sébastien Campion
,
Julien Devigne
,
Céline Duguey
,
Pierre-Alain Fouque
Multi-Device for Signal.
ACNS (2)
(2020)
Xuan Thanh Do
,
Duong Hieu Phan
,
Moti Yung
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes.
ACNS (2)
(2020)
Tran Phuong Thao
,
Yukiko Sawaya
,
Hoang-Quoc Nguyen-Son
,
Akira Yamada
,
Ayumu Kubota
,
Tran Van Sang
,
Rie Shigetomi Yamaguchi
Human Factors in Homograph Attack Recognition.
ACNS (2)
(2020)
Juan E. Rubio
,
Cristina Alcaraz
,
Javier López
Game Theory-Based Approach for Defense Against APTs.
ACNS (2)
(2020)
Viet Vo
,
Shangqi Lai
,
Xingliang Yuan
,
Shifeng Sun
,
Surya Nepal
,
Joseph K. Liu
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
ACNS (2)
(2020)
Harm Griffioen
,
Tim M. Booij
,
Christian Doerr
Quality Evaluation of Cyber Threat Intelligence Feeds.
ACNS (2)
(2020)
Zhangkai Zhang
,
Yueqiang Cheng
,
Zhoujun Li
Super Root: A New Stealthy Rooting Technique on ARM Devices.
ACNS (2)
(2020)
F. Betül Durak
,
Loïs Huguenin-Dumittan
,
Serge Vaudenay
\(\mathsf {BioLocker}\): A Practical Biometric Authentication Mechanism Based on 3D Fingervein.
ACNS (2)
(2020)
Rosario Gennaro
,
David Hadaller
,
Tahereh Jafarikhah
,
Zhuobang Liu
,
William E. Skeith III
,
Anastasiia Timashova
Publicly Evaluatable Perceptual Hashing.
ACNS (2)
(2020)
Cezara Benegui
,
Radu Tudor Ionescu
A Breach into the Authentication with Built-in Camera (ABC) Protocol.
ACNS (2)
(2020)
Anh-Tu Hoang
,
Barbara Carminati
,
Elena Ferrari
Cluster-Based Anonymization of Knowledge Graphs.
ACNS (2)
(2020)
Daniel Gardham
,
Mark Manulis
,
Constantin Catalin Dragan
Biometric-Authenticated Searchable Encryption.
ACNS (2)
(2020)
Karim Eldefrawy
,
Michael Locasto
,
Norrathep Rattanavipanon
,
Hassen Saïdi
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables.
ACNS (2)
(2020)
Ilkan Esiyok
,
Lucjan Hanzlik
,
Robert Künnemann
,
Lena Marie Budde
,
Michael Backes
TrollThrottle - Raising the Cost of Astroturfing.
ACNS (2)
(2020)
Pierpaolo Santucci
,
Emiliano Ingrassia
,
Giulio Picierro
,
Marco Cesati
MemShield: GPU-Assisted Software Memory Encryption.
ACNS (2)
(2020)
Elmahdi Bentafat
,
M. Mazhar Rathore
,
Spiridon Bakiras
A Practical System for Privacy-Preserving Video Surveillance.
ACNS (2)
(2020)
volume 12147, 2020
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II.
ACNS (2)
12147 (2020)