default search action
18th SECRYPT 2021
- Sabrina De Capitani di Vimercati, Pierangela Samarati:
Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021. SCITEPRESS 2021, ISBN 978-989-758-524-1
Invited Speakers
- Jaideep Vaidya:
Privacy-Preserving Analytics in the Big Data Environment. SECRYPT 2021: 5 - V. S. Subrahmanian:
VEST: An Early Warning System for Future Cyber-Attacks. SECRYPT 2021: 7 - Ravi S. Sandhu:
Access Control Convergence: Challenges and Opportunities. SECRYPT 2021: 9
Papers
- Cyrius Nugier, Diane Leblanc-Albarel, Agathe Blaise, Simon Masson, Paul Huynh, Yris Brice Wandji Piugie:
An Upcycling Tokenization Method for Credit Card Numbers. 15-25 - Stephan Seifermann, Robert Heinrich, Dominik Werle, Ralf H. Reussner:
A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures. 26-37 - Kaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen:
Can a TLS Certificate Be Phishy? 38-49 - Milan Lopuhaä-Zwakenberg, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone:
Comparing Classifiers' Performance under Differential Privacy. 50-61 - Thomas Groß:
Hashing to Prime in Zero-Knowledge. 62-74 - Denis Firsov, Henri Lakk, Sven Laur, Ahto Truu:
BLT+L: Efficient Signatures from Timestamping and Endorsements. 75-86 - Florian Thaeter, Rüdiger Reischuk:
Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss. 87-98 - Héloïse Maurel, Santiago A. Vidal, Tamara Rezk:
Statically Identifying XSS using Deep Learning. 99-110 - Muhammad I. H. Sukmana, Kai-Oliver Kohlen, Carl Gödecken, Pascal Schulze, Christoph Meinel:
Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems. 111-124 - Vasilios Koutsokostas, Constantinos Patsakis:
Python and Malware: Developing Stealth and Evasive Malware without Obfuscation. 125-136 - Andreas Abraham, Christopher Schinnerl, Stefan More:
SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance. 137-148 - Felix Hörandner, Bernd Prünster:
Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation. 149-160 - Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis:
Towards Integrating Security in Industrial Engineering Design Practices. 161-172 - Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame:
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation. 173-184 - Marino Miculan, Nicola Vitacolonna:
Automated Symbolic Verification of Telegram's MTProto 2.0. 185-197 - Mario Lilli, Chiara Braghin, Elvinia Riccobene:
Formal Proof of a Vulnerability in Z-Wave IoT Protocol. 198-209 - Karl Norrman, Vaishnavi Sundararajan, Alessandro Bruni:
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices. 210-221 - Marco Pernpruner, Giada Sciarretta, Silvio Ranise:
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments. 222-233 - Marius Schlegel, Peter Amthor:
The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. SECRYPT 2021: 234-246 - Jeffrey Todd McDonald, Ramya Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel:
Program Protection through Software-based Hardware Abstraction. 247-258 - Ibifubara Iganibo, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito:
Vulnerability Metrics for Graph-based Configuration Security. 259-270 - Md. Morshedul Islam, Reihaneh Safavi-Naini:
Model Inversion for Impersonation in Behavioral Authentication Systems. 271-282 - Nazim Uddin Sheikh, Zhigang Lu, Hassan Asghar, Mohamed Ali Kâafar:
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. 283-294 - Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi:
Preventing Watermark Forging Attacks in a MLaaS Environment. 295-306 - Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos:
Boolean Exponent Splitting. 321-332 - Evgeniy O. Kiktenko, Mikhail A. Kudinov, Andrey A. Bulychev, Aleksey K. Fedorov:
Proof-of-Forgery for Hash-based Signatures. 333-342 - Marius Schlegel:
Trusted Enforcement of Application-specific Security Policies. 343-355 - Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android. 356-369 - Stefano Berlato, Roberto Carbone, Silvio Ranise:
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment. 370-381 - Kees Leune, Sung Kim:
Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling. 385-394 - George Teseleanu:
Signer and Message Ambiguity from a Variety of Keys. 395-402 - Nicolas Bailluet, Hélène Le Bouder, David Lubicz:
Ransomware Detection using Markov Chain Models over File Headers. 403-411 - Efe Ulas Akay Seyitoglu, Attila Altay Yavuz, Thang Hoang:
Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work. 412-419 - Murat Burhan Ilter, Ali Aydin Selçuk:
A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE. 420-427 - Carlos Villarán, Marta Beltrán:
Protecting End User's Privacy When using Social Login through GDPR Compliance. 428-435 - Erwin Hoogerwerf, Daphne van Tetering, Aslí Bay, Zekeriya Erkin:
Efficient Joint Random Number Generation for Secure Multi-party Computation. 436-443 - Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert:
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. 444-451 - Basant Subba, Ayushi Singh:
A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation. 452-459 - Pål Ellingsen, Constanza Riera, Pantelimon Stanica, Anton Tkachenko:
An Extension of the Avalanche Criterion in the Context of c-Differentials. 460-467 - Anass Sbai, Cyril Drocourt, Gilles Dequen:
A New Delegated Authentication Protocol based on PRE. 468-478 - Rosangela Casolare, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Mobile Family Detection through Audio Signals Classification. 479-486 - Benoît Fournier, Valérie Viet Triem Tong, Gilles Guette:
Accurate Measurement of the Energy Consumption of Security Functions. 487-494 - Ferucio Laurentiu Tiplea, Cristian Hristea:
Practically Efficient RFID Scheme with Constant-time Identification. 495-506 - Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid:
A Comparison of GKE Protocols based on SIDH. 507-514 - Aslí Bay, Zeki Erkin, Mina Alishahi, Jelle Vos:
Multi-Party Private Set Intersection Protocols for Practical Applications. 515-522 - Rasmus Hagberg, Martin Hell, Christoph Reichenbach:
Using Program Analysis to Identify the Use of Vulnerable Functions. 523-530 - Fabien Herbaut, Nicolas Méloni, Pascal Véron:
Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains. 531-539 - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Secure Computation by Secret Sharing using Input Encrypted with Random Number. 540-547 - Chloe Tartan, Craig Wright, Michaella Pettit, Wei Zhang:
A Scalable Bitcoin-based Public Key Certificate Management System. 548-559 - Jaouhara Bouamama, Mustapha Hedabou, Mohammed Erradi:
Cloud Key Management using Trusted Execution Environment. 560-567 - Gustavo Gonzalez Granadillo, Alejandro G. Bedoya, Rodrigo Diaz:
An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning Algorithms. 568-575 - Marcin Gregorczyk, Wojciech Mazurczyk:
Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach. 576-586 - Parjanya Vyas, R. K. Shyamasundar:
SecSDN: A Novel Architecture for a Secure SDN. 587-594 - Ratna Dutta, Sumit Kumar Debnath, Chinmoy Biswas:
Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem. 595-602 - Nils Mäurer, Christoph Gentsch, Thomas Gräupl, Corinna Schmitt:
Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS. 603-610 - Christophe Nègre:
Side Channel Counter-measures based on Randomized AMNS Modular Multiplication. 611-619 - Sara Foresti, Giovanni Livraga:
Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation. 620-627 - Wojciech Wodo, Damian Stygar, Przemyslaw Blaskiewicz:
Security Issues of Electronic and Mobile Banking. 631-638 - Sohail Rajdev, Barsha Mitra:
Enforcing Cardinality Constraint in Temporal RBAC. 639-646 - Nadia Hocine, Ismail Bokhari:
Dynamic Access Control Framework for Enterprise Content Management Systems. 647-652 - Pritam Pallab, Abhijit Das:
AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method. 653-658 - Julius Hekkala, Sara Nikula, Outi-Marja Latvala, Kimmo Halunen:
Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC. 659-664 - I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. 665-673 - I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. 674-679 - Ionita Andreea:
Private Set Intersection: Past, Present and Future. 680-685 - Marinos Tsantekidis, Vassilis Prevelakis:
MMU-based Access Control for Libraries. 686-691 - Kaito Uemura, Satoshi Obana:
Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack. 692-697 - Sourav Roy, Dipnarayan Das, Anindan Mondal, Mahabub Hasan Mahalat, Suchismita Roy, Bibhash Sen:
PUF based Lightweight Authentication and Key Exchange Protocol for IoT. 698-703 - Anne V. D. M. Kayem, Nikolai J. Podlesny, Christoph Meinel:
On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service. 704-714 - Mathias P. M. Parisot, Balázs Pejó, Dayana Spagnuelo:
Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model's Complexity. 715-721 - Mujahid Muhammad, Paul Kearney, Adel Aneiba, Junaid Arshad, Andreas Kunz:
RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications. 722-727 - Mateusz Kozlowski, Bogdan Ksiezopolski:
A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks. 728-733 - Grzegorz J. Blinowski, Pawel Piotrowski, Michal Wisniewski:
Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities. 734-740 - Takoua Guiga, Jean-Jacques Schwartzmann, Christophe Rosenberger:
Privacy Aura for Transparent Authentication on Multiple Smart Devices. 741-746 - Denis Migdal, Ilaria Magotti, Christophe Rosenberger:
Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics. 747-753 - Jacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski:
Fair Mutual Authentication. 754-759 - Sara Ricci, Petr Jedlicka, Peter Cíbik, Petr Dzurenda, Lukas Malina, Jan Hajny:
Towards CRYSTALS-Kyber VHDL Implementation. 760-765 - Pascal Lafourcade, Léo Robert, Demba Sow:
Fast Cramer-Shoup Cryptosystem. 766-771 - Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, Ghaleb Hoblos, Leïla Azouz Saïdane:
RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network. 772-778 - Piotr Kawa, Piotr Syga:
Verify It Yourself: A Note on Activation Functions' Influence on Fast DeepFake Detection. 779-784 - Milan Cermák, Denisa Sramkova:
GRANEF: Utilization of a Graph Database for Network Forensics. 785-790 - Raul Casanova Marques, Pavel Pascacio, Jan Hajny, Joaquín Torres-Sospedra:
Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems. 791-797 - Yaw Frempong, Yates Snyder, Erfan Al-Hossami, Meera Sridhar, Samira Shaikh:
HIJaX: Human Intent JavaScript XSS Generator. 798-805 - Thomas Marchioro, Andrei Kazlouski, Evangelos P. Markatos:
User Identification from Time Series of Fitness Data. 806-811 - Hiral S. Trivedi, Sankita J. Patel:
Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things. 812-818 - Mitsuhiro Mabuchi, Koji Hasebe:
C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments. 819-826 - Salimeh Dashti, Anderson Santana de Oliveira, Caelin Kaplan, Manuel Dalcastagné, Silvio Ranise:
Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment? 827-832 - Christophe Ponsard, Valéry Ramon, Jean-Christophe Deprez:
Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434. 833-838 - Wisnu Uriawan, Omar Hasan, Youakim Badr, Lionel Brunie:
Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp). 839-844 - Mark Dockendorf, Ram Dantu, Kirill Morozov, Sanjukta Bhowmick:
Investing Data with Untrusted Parties using HE. 845-853 - Colby Parker, Jeffrey Todd McDonald, Dimitrios Damopoulos:
Machine Learning Classification of Obfuscation using Image Visualization. 854-859
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.