default search action
1st SVCC 2020: San Jose, CA, USA
- Younghee Park, Divyesh Jadav, Thomas H. Austin:
Silicon Valley Cybersecurity Conference - First Conference, SVCC 2020, San Jose, CA, USA, December 17-19, 2020, Revised Selected Papers. Communications in Computer and Information Science 1383, Springer 2021, ISBN 978-3-030-72725-3 - Nicholas Hunter Gauthier, Mohammad Iftekhar Husain:
Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams. 3-24 - Tae-Hoon Kim, Won-Bin Kim, Daehee Seo, Im-Yeong Lee:
A Secure Encapsulation Schemes Based on Key Recovery System. 25-37 - Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator. 38-48 - Wei-Tek Tsai, Dong Yang, Rong Wang, Kangmin Wang, Weijing Xiang, Enyan Deng:
STRISA: A New Regulation Architecture to Enforce Travel Rule. 49-67 - Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff:
Post-quantum Hash-Based Signatures for Secure Boot. 71-86 - Paul A. Wortman, Fatemeh Tehranipoor, John A. Chandy:
Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards. 87-97 - Bonha Koo, Taegeun Moon, Hyoungshick Kim:
MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management. 98-108 - Nikita Acharya, Vedika Saravanan, Samah Mohamed Saeed:
An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure. 109-114 - Thomas H. Austin:
SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping. 117-133 - Mostafa Yalpanian, Naser Mirzaei, Alireza Parvizimosaed, Farid Farmani, Mehdi Parvizimosaed, Behdad Bahrami:
BIOT: A Blockchain-Based IoT Platform for Distributed Energy Resource Management. 134-147 - Wenjun Fan, Shubham Kumar, Vrushali Jadhav, Sang-Yoon Chang, Younghee Park:
A Privacy Preserving E-Voting System Based on Blockchain. 148-159 - Yan Chen, Thomas H. Austin, Philip Heller:
BioBlockchain: Useful Proof-of-Work with Multiple Sequence Alignment. 160-166 - Chungsik Song, Wenjun Fan, Sang-Yoon Chang, Younghee Park:
Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity. 169-187 - Youngrok Song, Sangwon Hyun, Yun-Gyung Cheong:
A Systematic Approach to Building Autoencoders for Intrusion Detection. 188-204 - Aishwarya Ram Vinay, Mohsen Ali Alawami, Hyoungshick Kim:
ConTheModel: Can We Modify Tweets to Confuse Classifier Models? 205-219 - Kratika Sahu, Rasika Kshirsagar, Surbhi Vasudeva, Taghreed Alzahrani, Nima Karimian:
IoT Checker Using Timing Side-Channel and Machine Learning. 220-226
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.