Login / Signup
ACNS (3)
2024
2024
2024
Keyphrases
Publications
2024
Siavash Riahi
,
Orfeas Stefanos Thyfronitis Litos
Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor Signatures.
ACNS (3)
(2024)
Kunal Mukherjee
,
Joshua Wiedemeier
,
Qi Wang
,
Junpei Kamimura
,
Junghwan John Rhee
,
James Wei
,
Zhichun Li
,
Xiao Yu
,
Lu-An Tang
,
Jiaping Gui
,
Kangkook Jee
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security.
ACNS (3)
(2024)
Nico Heitmann
,
Hendrik Siewert
,
Sven Moog
,
Juraj Somorovsky
Security Analysis of BigBlueButton and eduMEET.
ACNS (3)
(2024)
H. T. M. A. Riyadh
,
Divyanshu Bhardwaj
,
Adrian Dabrowski
,
Katharina Krombholz
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures.
ACNS (3)
(2024)
Ruize Wang
,
Martin Brisfors
,
Elena Dubrova
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation.
ACNS (3)
(2024)
Soumyadyuti Ghosh
,
Manaar Alam
,
Soumyajit Dey
,
Debdeep Mukhopadhyay
"Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure.
ACNS (3)
(2024)
Naiqian Zhang
,
Zheyun Feng
,
Dongpeng Xu
An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation.
ACNS (3)
(2024)
Sepideh Avizheh
,
Reihaneh Safavi-Naini
Fair Private Set Intersection Using Smart Contracts.
ACNS (3)
(2024)
Yunxue Lin
,
Ling Sun
Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48.
ACNS (3)
(2024)
Adrian Kailus
,
Dustin Kern
,
Christoph Krauß
Self-sovereign Identity for Electric Vehicle Charging.
ACNS (3)
(2024)
Xianbo Wang
,
Kaixuan Luo
,
Wing Cheong Lau
Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps.
ACNS (3)
(2024)
Ranjit Kumaresan
,
Duc Viet Le
,
Mohsen Minaei
,
Srinivasan Raghuraman
,
Yibin Yang
,
Mahdi Zamani
Programmable Payment Channels.
ACNS (3)
(2024)
Daniel Köhler
,
Wenzel Pünter
,
Christoph Meinel
How Users Investigate Phishing Emails that Lack Traditional Phishing Cues.
ACNS (3)
(2024)
Valeria Nikolaenko
,
Sam Ragsdale
,
Joseph Bonneau
,
Dan Boneh
Powers-of-Tau to the People: Decentralizing Setup Ceremonies.
ACNS (3)
(2024)
Pawel Lorek
,
Moti Yung
,
Filip Zagórski
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications.
ACNS (3)
(2024)
Puja Mondal
,
Suparna Kundu
,
Sarani Bhattacharya
,
Angshuman Karmakar
,
Ingrid Verbauwhede
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer.
ACNS (3)
(2024)
Mohammad Hashemi
,
Domenic Forte
,
Fatemeh Ganji
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions.
ACNS (3)
(2024)
volume 14585, 2024
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III
ACNS (3)
14585 (2024)