Login / Signup
SecureComm (2)
2014
2017
2021
2014
2021
Keyphrases
Publications
2021
Parhat Abla
,
Mingsheng Wang
An Efficient Post-Quantum PKE from RLWR with Simple Security Proof.
SecureComm (2)
(2021)
Nicolae Paladi
,
Marco Tiloca
,
Pegah Nikbakht Bideh
,
Martin Hell
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks.
SecureComm (2)
(2021)
Shangcheng Shi
,
Xianbo Wang
,
Kyle Zeng
,
Ronghai Yang
,
Wing Cheong Lau
An Empirical Study on Mobile Payment Credential Leaks and Their Exploits.
SecureComm (2)
(2021)
Simone Perriello
,
Alessandro Barenghi
,
Gerardo Pelosi
A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems.
SecureComm (2)
(2021)
Yin Liu
,
Breno Dantas Cruz
,
Eli Tilevich
HTPD: Secure and Flexible Message-Based Communication for Mobile Apps.
SecureComm (2)
(2021)
Linshu Ouyang
,
Yongzheng Zhang
Phishing Web Page Detection with Semi-Supervised Deep Anomaly Detection.
SecureComm (2)
(2021)
Francesco Buccafurri
,
Vincenzo De Angelis
,
Maria Francesca Idone
,
Cecilia Labrini
Anonymous Short Communications over Social Networks.
SecureComm (2)
(2021)
Zhenhua Wang
,
Wei Xie
,
Jing Tao
,
Yong Tang
,
Enze Wang
XHunter: Understanding XXE Vulnerability via Automatic Analysis.
SecureComm (2)
(2021)
Pol Van Aubel
,
Erik Poll
Compromised Through Compression - Privacy Implications of Smart Meter Traffic Analysis.
SecureComm (2)
(2021)
Said A. Salloum
,
Tarek Gaber
,
Sunil Vadera
,
Khaled Shaalan
Phishing Website Detection from URLs Using Classical Machine Learning ANN Model.
SecureComm (2)
(2021)
Mojtaba Zaheri
,
Reza Curtmola
Leakuidator: Leaky Resource Attacks and Countermeasures.
SecureComm (2)
(2021)
Reza Azarderakhsh
,
Rami Elkhatib
,
Brian Koziel
,
Brandon Langenberg
Hardware Deployment of Hybrid PQC: SIKE+ECDH.
SecureComm (2)
(2021)
Naoki Fukushi
,
Takashi Koide
,
Daiki Chiba
,
Hiroki Nakano
,
Mitsuaki Akiyama
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors.
SecureComm (2)
(2021)
Xiaojie Xu
,
Jian Dong
,
Zhengyu Liu
,
Jin Yang
,
Bin Wang
,
Zhaoyuan Wang
A Sybil Detection Method in OSN Based on DistilBERT and Double-SN-LSTM for Text Analysis.
SecureComm (2)
(2021)
Zelei Cheng
,
Zuotian Li
Poisoning Attack for Inter-agent Transfer Learning.
SecureComm (2)
(2021)
Md Hasan Shahriar
,
Mohammad Ashiqur Rahman
,
Nur Imtiazul Haque
,
Badrul Chowdhury
,
Steven G. Whisenant
iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems.
SecureComm (2)
(2021)
Alexandre Augusto Giron
Encouraging the Adoption of Post-Quantum Hybrid Key Exchange in Network Security.
SecureComm (2)
(2021)
Shashank Reddy Danda
,
Xiaoyong Yuan
,
Bo Chen
Towards Stealing Deep Neural Networks on Mobile Devices.
SecureComm (2)
(2021)
Yifan Wang
,
Yuchen Zhang
,
Chengbin Pang
,
Peng Li
,
Nikolaos Triandopoulos
,
Jun Xu
Facilitating Parallel Fuzzing with Mutually-Exclusive Task Distribution.
SecureComm (2)
(2021)
Ryan Karl
Quantitative and Qualitative Investigations into Trusted Execution Environments.
SecureComm (2)
(2021)
Pallavi Sivakumaran
,
Jorge Blasco
Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy.
SecureComm (2)
(2021)
Mila Anastasova
,
Mojtaba Bisheh-Niasar
,
Reza Azarderakhsh
,
Mehran Mozaffari Kermani
Compressed SIKE Round 3 on ARM Cortex-M4.
SecureComm (2)
(2021)
Pakize Sanal
,
Emrah Karagoz
,
Hwajeong Seo
,
Reza Azarderakhsh
,
Mehran Mozaffari Kermani
Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors.
SecureComm (2)
(2021)
Md Shahab Uddin
,
Mohammad Mannan
,
Amr M. Youssef
Horus: A Security Assessment Framework for Android Crypto Wallets.
SecureComm (2)
(2021)
Nikolay Ivanov
,
Qiben Yan
System-Wide Security for Offline Payment Terminals.
SecureComm (2)
(2021)
Octavian Ciprian Bordeanu
,
Gianluca Stringhini
,
Yun Shen
,
Toby Davies
JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage.
SecureComm (2)
(2021)
Chengbin Hu
,
Yao Liu
,
Zhuo Lu
,
Shangqing Zhao
,
Xiao Han
,
Junjie Xiong
Smartphone Location Spoofing Attack in Wireless Networks.
SecureComm (2)
(2021)
Douglas J. Leith
Mobile Handset Privacy: Measuring the Data iOS and Android Send to Apple and Google.
SecureComm (2)
(2021)
volume 399, 2021
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II
SecureComm (2)
399 (2021)
2020
Yu Wang
,
Zhenzhen Li
,
Gaopeng Gou
,
Gang Xiong
,
Chencheng Wang
,
Zhen Li
Identifying DApps and User Behaviors on Ethereum via Encrypted Traffic.
SecureComm (2)
(2020)
Mingkui Wei
,
Khaled Rabieh
,
Faisal Kaleem
CacheLoc: Leveraging CDN Edge Servers for User Geolocation.
SecureComm (2)
(2020)
Rafal Leszczyna
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study.
SecureComm (2)
(2020)
Muhammad Ihsan Haikal Sukmana
,
Kennedy Aondona Torkura
,
Sezi Dwi Sagarianti Prasetyo
,
Feng Cheng
,
Christoph Meinel
A Brokerage Approach for Secure Multi-Cloud Storage Resource Management.
SecureComm (2)
(2020)
Ayush Kumar
,
Mrinalini Shridhar
,
Sahithya Swaminathan
,
Teng Joon Lim
ML-Based Early Detection of IoT Botnets.
SecureComm (2)
(2020)
Candong Rong
,
Gaopeng Gou
,
Mingxin Cui
,
Gang Xiong
,
Zhen Li
,
Li Guo
TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning.
SecureComm (2)
(2020)
Andreas Zdziarstek
,
Willi Brekenfelder
,
Felix Eibisch
Using the Physical Layer to Detect Attacks on Building Automation Networks.
SecureComm (2)
(2020)
Songsong Liu
,
Qiyang Song
,
Kun Sun
,
Qi Li
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage.
SecureComm (2)
(2020)
Sang-Yoon Chang
Share Withholding in Blockchain Mining.
SecureComm (2)
(2020)
Md Ariful Haque
,
Sachin Shetty
,
Charles A. Kamhoua
,
Kimberly Gold
Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems.
SecureComm (2)
(2020)
Golam Dastoger Bashar
,
Alejandro Anzola Avila
,
Gaby G. Dagher
PoQ: A Consensus Protocol for Private Blockchains Using Intel SGX.
SecureComm (2)
(2020)
Liting Deng
,
Hui Wen
,
Mingfeng Xin
,
Yue Sun
,
Limin Sun
,
Hongsong Zhu
Malware Classification Using Attention-Based Transductive Learning Network.
SecureComm (2)
(2020)
Xinxin Fan
,
Zhi Zhong
,
Qi Chai
,
Dong Guo
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System.
SecureComm (2)
(2020)
Jaehyun Han
,
Zhiqiang Lin
,
Donald E. Porter
On the Effectiveness of Behavior-Based Ransomware Detection.
SecureComm (2)
(2020)
Sameh Khalfaoui
,
Jean Leneutre
,
Arthur Villard
,
Jingxuan Ma
,
Pascal Urien
COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment.
SecureComm (2)
(2020)
Javier I. Campos
,
Kristen Johnson
,
Jonathan Neeley
,
Staci Roesch
,
Farha Jahan
,
Quamar Niyaz
,
Khair Al Shamaileh
A Machine Learning Based Smartphone App for GPS Spoofing Detection.
SecureComm (2)
(2020)
Immanuel Kunz
,
Christian Banse
,
Philipp Stephanow
Selecting Privacy Enhancing Technologies for IoT-Based Services.
SecureComm (2)
(2020)
Friedrich Doku
,
Ethan Doku
Khopesh - Contact Tracing Without Sacrificing Privacy.
SecureComm (2)
(2020)
Xuebin Ma
,
Jingyu Yang
,
Shengyi Guan
Differentially Private Social Graph Publishing for Community Detection.
SecureComm (2)
(2020)
Nilanjan Sen
,
Ram Dantu
,
Kirill Morozov
: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security.
SecureComm (2)
(2020)
volume 336, 2020
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II
SecureComm (2)
336 (2020)