default search action
20th SECRYPT 2023: Rome, Italy
- Sabrina De Capitani di Vimercati, Pierangela Samarati:
Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023. SCITEPRESS 2023, ISBN 978-989-758-666-8
Invited Speakers
- Rigo Wenning:
The Certification Panacea. SECRYPT 2023: 5 - Patrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl:
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code. 7-19
Papers
- David Schrammel, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, Stefan Mangard:
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware. 25-36 - Sonakshi Garg, Vicenç Torra:
K-Anonymous Privacy Preserving Manifold Learning. 37-48 - Axel Rousselot, Nora Cuppens, Samra Bouakkaz:
AIS Authentication Using Certificateless Cryptography. 49-61 - Trisha Chakraborty, Shaswata Mitra, Sudip Mittal:
CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense. 62-72 - Francesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro:
Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications. 73-84 - Muhammad Nauman Khan, Asha Rao, Seyit Camtepe, Josef Pieprzyk:
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme. 85-98 - Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He:
ZT-NIDS: Zero Trust, Network Intrusion Detection System. 99-110 - Zeynep Sila Kaya, Mehmet Emre Gursoy:
On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data. 111-122 - Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi:
A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials. 123-134 - Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic:
BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments. 135-146 - Thomas Schneider, Hossein Yalame, Michael Yonli:
Griffin: Towards Mixed Multi-Key Homomorphic Encryption. 147-158 - Md. Al Amin, Amani Altarawneh, Indrajit Ray:
Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach. 159-170 - Nicolas Chiapputo, Yvo Desmedt, Kirill Morozov:
Using Untrusted and Unreliable Cloud Providers to Obtain Private Email. 171-182 - Olutola Adebiyi, Massimiliano Albanese:
Towards Usable Scoring of Common Weaknesses. 183-191 - Mark Dockendorf, Ram Dantu:
Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives. 192-205 - Clémentine Gritti, Frédéric A. Hayek, Pascal Lafourcade:
Generic Blockchain on Generic Human Behavior. 206-217 - Alexandru Ionita:
Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures. 230-241 - Guillaume Gagnon, Sébastien Gambs, Mathieu Cunche:
RSSI-Based Fingerprinting of Bluetooth Low Energy Devices. 242-253 - Maryam Sheikhi, Rosario Giustolisi, Carsten Schürmann:
Receipt-Free Electronic Voting from zk-SNARK. SECRYPT 2023: 254-266 - Davide Agostinello, Angelo Genovese, Vincenzo Piuri:
Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques. 267-275 - Kayode S. Adewole, Vicenç Torra:
Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks. 279-286 - Libor Polcák, Marek Salon, Giorgio Maone, Radek Hranický, Michael McMahon:
JShelter: Give Me My Browser Back. 287-294 - George Teseleanu:
Threshold Cryptosystems Based on 2^k-th Power Residue Symbols. 295-302 - Motonari Honda, Yuichi Kaji:
Improvement of Winternitz OTS with a Novel Fingerprinting Function. 303-311 - Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath:
Lessons Learned: Defending Against Property Inference Attacks. 312-323 - Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, D. Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. 324-334 - Arjun Prasad, Kevin Kanichery Biju, Soumya Somani, Barsha Mitra:
Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis. SECRYPT 2023: 335-344 - Alexander Mühle, Katja Assaf, Christoph Meinel:
One to Bind Them: Binding Verifiable Credentials to User Attributes. 345-352 - George Teseleanu:
A Note on a CBC-Type Mode of Operation. 353-360 - Mustapha Benssalah, Karim Drouiche:
On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication. 361-368 - Sehrish Shafeeq, Mathias Fischer:
SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme. 369-376 - Argiro Anagnostopoulou, Ioannis Mavridis, Dimitris Gritzalis:
Risk-Based Illegal Information Flow Detection in the IIoT. 377-384 - Amine Hattak, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning. 385-393 - Rocco Zaccagnino, Antonio Cirillo, Alfonso Guarino, Nicola Lettieri, Delfina Malandrino, Gianluca Zaccagnino:
Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks. 394-401 - El Mahdi Mercha, El Mostapha Chakir, Mohammed Erradi:
Trans-IDS: A Transformer-Based Intrusion Detection System. 402-409 - Angelica Marotta, Stuart E. Madnick:
Regulating Cyber Incidents: A Review of Recent Reporting Requirements. 410-416 - Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong:
BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports. 417-424 - Shubham Raj, Snehil Joshi, Kannan Srinathan:
PIUDI: Private Information Update for Distributed Infrastructure. 425-432 - Gerald Palfinger:
OCScraper: Automated Analysis of the Fingerprintability of the iOS API. 433-441 - Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement. 442-449 - Kevin Shi, Sherif Saad:
Automated Feature Engineering for AutoML Using Genetic Algorithms. 450-459 - Roland Czerny, Christian Kollmann, Blaz Podgorelec, Bernd Prünster, Thomas Zefferer:
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems. 460-468 - Ghada Almashaqbeh, Rohit Chatterjee:
Unclonable Cryptography: A Tale of Two No-Cloning Paradigms. 469-477 - Mohamed Salah Azzaz, Redouane Kaibou, Hamdane Kamelia, Abdenour Kifouche, Djamel Teguig:
Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption. 478-485 - David Schatz, Friedrich Altheide, Hedwig Koerfgen, Michael Rossberg, Guenter Schaefer:
Virtual Private Networks in the Quantum Era: A Security in Depth Approach. 486-494 - Catalin V. Bîrjoveanu, Mirela Bîrjoveanu:
Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries. 495-502 - Navya Sivaraman, Simin Nadjm-Tehrani:
5G Handover: When Forward Security Breaks. 503-510 - Wisam Abbasi, Paolo Mori, Andrea Saracino:
The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis. 511-519 - Quentin L. Meunier, Abdul Rahman Taleb:
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations. 520-527 - Syed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage:
A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things. 528-539 - Matluba Khodjaeva, Giovanni Di Crescenzo:
On Single-Server Delegation Without Precomputation. 540-547 - Pascal Wichmann, Sam Ansari, Hannes Federrath, Jens Lindemann:
WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers. 548-556 - Rudrapatna K. Shyamasundar:
ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract. 557-566 - Sangita Roy, Rudrapatna K. Shyamasundar:
A Rand Index-Based Analysis of Consensus Protocols. 567-576 - Sudipta Paul, Vicenç Torra:
Δ SFL: (Decoupled Server Federated Learning) to Utilize DLG Attacks in Federated Learning by Decoupling the Server. 577-584 - Sara Nikula, Pekka Koskela, Outi-Marja Latvala, Sami Lehtonen:
Light Quantum Key Distribution Network Security Estimation Tool. 587-596 - Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani:
Evaluating Label Flipping Attack in Deep Learning-Based NIDS. 597-603 - Laurent Gomez, Francesco Capano, Patrick Duverger:
Security for Next-Gen Analytics for Cross-Organisation Collaboration. 604-609 - Arne Roar Nygård, Sokratis K. Katsikas:
Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid. 610-616 - Mikael Carmona, Doryan Lesaignoux, Antoine Loiseau:
On the Implementation of a Lattice-Based Revocable Hierarchical Ibe. 617-623 - Lucas Lange, Maja Schneider, Peter Christen, Erhard Rahm:
Privacy in Practice: Private COVID-19 Detection in X-Ray Images. 624-633 - Cong-Binh Le, Bao-Thi Nguyen-Le, Phuoc-Loc Truong, Minh-Triet Tran, Anh-Duy Tran:
ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development. 634-641 - Balázs Pejó, Nikolett Kapui:
SQLi Detection with ML: A Data-Source Perspective. 642-648 - Brian Lewandowski:
Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets. 649-658 - Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Luca Piras, Andrei Petrovski:
Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models. 659-666 - Mofareh Waqdan, Habib Louafi, Malek Mouhoub:
A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment. 667-672 - Arijit Karati, Yu-Sheng Chang, Ting-Yu Chen:
Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices. 673-682 - Libor Polcák, Kamil Jerábek:
Data Protection and Security Issues with Network Error Logging. 683-690 - Catalin Rus, Dipti Kapoor Sarmah, Mohammed El-Hajj:
Defeating MageCart Attacks in a NAISS Way. 691-697 - Laltu Sardar, Subhra Mazumdar:
Fidelis: Verifiable Keyword Search with No Trust Assumption. 698-703 - Marina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga:
Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys. 704-709 - Shabnam Khanna, Ciara Rafferty:
Approximate Homomorphic Pre-Processing for CNNs. 710-715 - Jan Marius Evang:
A 10-Layer Model for Service Availability Risk Management. 716-723 - Patrik Dobias, Sara Ricci, Petr Dzurenda, Lukas Malina, Nikita Snetkov:
Lattice-Based Threshold Signature Implementation for Constrained Devices. 724-730 - Shahzad Ahmad, Stefan Rass:
How to Plausibly Deny Steganographic Secrets. 731-737 - Waheeb Yaqub, Manoranjan Mohanty, Basem Suleiman:
Proctoring Online Exam Using Eye Tracking. 738-745 - Roberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo:
Blockchain Data Replication. 746-751 - Dario Castellano, Roberto De Prisco, Pompeo Faruolo:
Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility. 752-757 - Biagio Boi, Marco De Santis, Christian Esposito:
Self-Sovereign Identity (SSI) Attribute-Based Web Authentication. 758-763 - Satoshi Kai, Takao Kondo, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka:
International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed "Hakoniwa". 764-771 - Amani Bacha, Farah Barika Ktata, Faten Louati:
Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized Approaches. 772-777 - Matous Kozák, Martin Jurecek:
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. 778-786 - Achyuth Nandikotkur, Issa Traoré, Mohammad Mamun:
Detecting BrakTooth Attacks. 787-792 - Hiroki Okada, Kazuhide Fukushima:
SoK: Towards CCA Secure Fully Homomorphic Encryption. 793-798 - Jaroslaw Bernacki, Rafal Scherer:
IMAGINE Dataset: Digital Camera Identification Image Benchmarking Dataset. 799-804 - Kazutaka Matsuzaki, Kenji Sawada, Shinichi Honiden:
Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis. 805-812 - Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda:
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. 813-821 - Aimen Mahmood, Haider Abbas, M. Faisal Amjad:
CNN-HMM Model for Real Time DGA Categorization. 822-829 - Hasina Rahman, Priyadarsi Nanda, Manoranjan Mohanty, Nazim Uddin Sheikh:
Anomaly Detection in Smart Grid Networks Using Power Consumption Data. 830-837 - Laurent Gomez, Tianchi Yu, Patrick Duverger:
Security for Distributed Machine Learning. 838-843 - Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A Secure Emergency Framework in an IoT Based Patient Monitoring System. 844-849 - ChihYun Chuang, IHung Hsu, TingFang Lee:
A Two-Party Hierarchical Deterministic Wallets in Practice. 850-856 - Alexandre Augusto Giron:
Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement. 857-862 - Chirag Jaju, Dhairya Agrawal, Rishi Poddar, Shubh Badjate, Sidharth Anand, Barsha Mitra, Soumyadeep Dey:
Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration. 863-869 - Myria Bouhaddi, Kamel Adi:
Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning. 870-875 - Mark Dockendorf, Ram Dantu:
Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs. 876-884
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.