default search action
16th ICETE 2019: Prague, Czech Republic - Volume 2
- Mohammad S. Obaidat, Pierangela Samarati:
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019. SciTePress 2019, ISBN 978-989-758-378-0
Invited Speakers
- Jalel Ben-Othman:
Security for Connected Vehicles in Cyberspace. ICETE (1) 2019: 5 - Adlen Ksentini:
Network Slicing an Enabler of 5G. ICETE (1) 2019: 7 - Soon Xin Ng:
Cooperative Communications, Distributed Coding and Machine Learning. ICETE (1) 2019: 9
Papers
- Salah S. Harb, M. Omair Ahmad, M. N. S. Swamy:
High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n). 15-24 - Vladimir Sedlacek, Dusan Klinec, Marek Sýs, Petr Svenda, Vashek Matyas:
I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor Viability. 25-36 - Mario Faiella, Gustavo Gonzalez Granadillo, Ibéria Medeiros, Rui Azevedo, Susana Gonzalez Zarzosa:
Enriching Threat Intelligence Platforms Capabilities. 37-48 - Octavian Catrina:
Efficient Secure Floating-point Arithmetic using Shamir Secret Sharing. 49-60 - Sarah McCarthy, James Howe, Neil Smyth, Séamus Brannigan, Máire O'Neill:
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme. 61-71 - Michael Heigl, Laurin Doerr, Martin Schramm, Dalibor Fiala:
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks. 72-83 - Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal:
A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications. 84-95 - Johannes Feichtner:
A Comparative Study of Misapplied Crypto in Android and iOS Applications. 96-108 - Mukti Padhya, Devesh C. Jinwala:
BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access Control. 109-124 - Giampaolo Bella, Karen Renaud, Diego Sempreboni, Luca Viganò:
An Investigation into the "Beautification" of Security Ceremonies. 125-136 - Marek Klonowski, Tomasz Struminski, Malgorzata Sulkowska:
Universal Encoding for Provably Irreversible Data Erasing. 137-148 - Linru Zhang, Gongxian Zeng, Yuechen Chen, Nairen Cao, Siu-Ming Yiu, Zheli Liu:
OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm. 149-160 - Diego Sempreboni, Giampaolo Bella, Rosario Giustolisi, Luca Viganò:
What Are the Threats? (Charting the Threat Models of Security Ceremonies). 161-172 - Dimitrios Vasilopoulos, Melek Önen, Refik Molva:
PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage. 173-186 - Gerald Palfinger, Bernd Prünster, Dominik Ziegler:
Prying CoW: Inferring Secrets across Virtual Machine Boundaries. 187-197 - Cyntia Vargas, Birgit Vogel-Heuser:
A Taxonomy of Metrics and Tests to Evaluate and Validate Properties of Industrial Intrusion Detection Systems. 201-210 - Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. 211-219 - Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure Strassen-Winograd Matrix Multiplication with MapReduce. 220-227 - Marwa Chaieb, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
DABSTERS: Distributed Authorities using Blind Signature to Effect Robust Security in e-Voting. 228-235 - Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure Intersection with MapReduce. 236-243 - Yi Li, Marcos Serrano, Tommy Chin, Kaiqi Xiong, Jing Lin:
A Software-defined Networking-based Detection and Mitigation Approach against KRACK. 244-251 - Bernd Prünster, Edona Fasllija, Dominik Mocher:
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks. 252-259 - Dorra Dhaou, Saoussen Ben Jabra, Ezzeddine Zagrouba:
A Robust Anaglyph 3D Video Watermarking based on Multi-sprite Generation. 260-267 - Amir Sharif, Roberto Carbone, Silvio Ranise, Giada Sciarretta:
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps. 268-275 - Salimeh Dashti, Silvio Ranise:
A Tool-assisted Methodology for the Data Protection Impact Assessment. 276-283 - Yuliya D. Vybornova, Vladislav Sergeev:
Method for Vector Map Protection based on using of a Watermark Image as a Secondary Carrier. 284-293 - Fabian Berner, Johannes Sametinger:
Dynamic Taint-tracking: Directions for Future Research. 294-305 - Johannes Feichtner, Lukas Neugebauer, Dominik Ziegler:
Mind the Gap: Finding What Updates Have (Really) Changed in Android Applications. 306-313 - Bernd Prünster, Gerald Palfinger, Christian Kollmann:
Fides: Unleashing the Full Potential of Remote Attestation. 314-321 - Martin Schanzenbach, Thomas Kilian, Julian Schütte, Christian Banse:
ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques. 325-332 - Erik Sonnleitner, Marc Kurz, Alexander Palmanshofer:
Indirect Data Representation Via Offset Vectoring: A Code-integrity-driven In-memory Data Regeneration Scheme. 333-340 - Khalil Hariss, Abed Ellatif Samhat, Maroun Chamoun:
An Efficient FHE Scheme to Secure Cloud Computing. 341-349 - Jorge Navas, Marta Beltrán:
Potential Impacts in Citizens' Privacy of using Federated Identity Management to Offer e-Government Services. 350-355 - Khazam Alhamdan, Tassos Dimitriou, Imtiaz Ahmad:
Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud. 356-362 - Imran Makhdoom, Ian Zhou, Mehran Abolhasan, Justin Lipman, Wei Ni:
PrivySharing: A Blockchain-based Framework for Integrity and Privacy-preserving Data Sharing in Smart Cities. 363-371 - Vanesa Daza, Xavier Salleras:
LASER: Lightweight and Secure Remote Keyless Entry Protocol. 372-377 - Nicolas M. Müller, Pascal Debus, Daniel Kowatsch, Konstantin Böttinger:
Distributed Anomaly Detection of Single Mote Attacks in RPL Networks. 378-385 - Gabriel Jozsef Berecz, István Gergely Czibula:
Hunting Traits for Cryptojackers. 386-393 - Anass Sbai, Cyril Drocourt, Gilles Dequen:
PRE as a Service within Smart Grid City. 394-401 - Luigi Marangio, Christophe Guyeux:
Entropy and Security of Pseudorandom Number Generators based on Chaotic Iterations. 402-407 - Max Schrötter, Thomas Scheffler, Bettina Schnor:
Evaluation of Intrusion Detection Systems in IPv6 Networks. 408-416 - Andreas Schaad, Tobias Reski:
"Open Weakness and Vulnerability Modeler" (OVVL): An Updated Approach to Threat Modeling. 417-424 - Georgia Tsaloli, Aikaterini Mitrokotsa:
Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees. 425-430 - Haibat Khan, Keith M. Martin:
On the Efficacy of New Privacy Attacks against 5G AKA. 431-438 - Laurent Gomez, Marcus Wilhelm, José Márquez, Patrick Duverger:
Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection. 439-447 - Denis Migdal, Christophe Rosenberger:
Keystroke Dynamics Anonymization System. 448-455 - Ágnes Kiss, Oliver Schick, Thomas Schneider:
Web Application for Privacy-preserving Scheduling using Secure Computation. 456-463 - Gustavo Gonzalez Granadillo, Rodrigo Diaz, Ibéria Medeiros, Susana Gonzalez Zarzosa, Dawid Machnicki:
LADS: A Live Anomaly Detection System based on Machine Learning Methods. 464-469 - Sam Ng, Tomás Tauber:
ECDSA-compatible Delegable Undeniable Signature. 470-477 - Ioana Boureanu, David Gérault, James Lewis:
Here and There at Once, with my Mobile Phone! 478-484 - Carles Angles-Tafalla, Sara Ricci, Petr Dzurenda, Jan Hajny, Jordi Castellà-Roca, Alexandre Viejo:
Decentralized Privacy-preserving Access for Low Emission Zones. 485-491 - Patryk Koziel, Lukasz Krzywiecki, Damian Stygar:
Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. 492-497 - Andreas Schaad, Tobias Reski, Oliver Winzenried:
Integration of a Secure Physical Element as a Trusted Oracle in a Hyperledger Blockchain. 498-503 - Tapadyoti Banerjee, Bijoy Das, Deval Mehta, Dipanwita Roy Chowdhury:
RACE: Randomized Counter Mode of Authenticated Encryption using Cellular Automata. 504-509 - Vishwas T. Patil, R. K. Shyamasundar:
Is Privacy a Myth for Facebook Users? 510-516 - Tikaram Sanyashi, Darshil Desai, Bernard Menezes:
Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem. 517-522 - Idris Zakariyya, M. Omar Al-Kadri, Harsha K. Kalutarage, Andrei Petrovski:
Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm. 523-528 - Yi Li, Kaiqi Xiong, Xiangyang Li:
An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques. 529-534 - Mouiad Al-Wahah, Ahmed Saaudi, Csilla Farkas:
Semantic-based Obligation for Context-Based Access Control. 535-540
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.