


default search action
22nd ACNS 2024: Abu Dhabi, United Arab Emirates - Workshops Part I
- Martin Andreoni:

Applied Cryptography and Network Security Workshops - ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14586, Springer 2024, ISBN 978-3-031-61485-9
AIBlock - Application Intelligence and Blockchain Security
- Saad El Jaouhari

, Nouredine Tamani
:
An End-to-End Secure Solution for IoMT Data Exchange. 3-15 - Xundi Yang, Kefan Qiu, Quanxin Zhang:

EasyLog: An Efficient Kernel Logging Service for Machine Learning. 16-28 - Yifan Zhou, Zhenyan Liu, Jingfeng Xue, Yong Wang, Ji Zhang:

LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification. 29-42 - Mitja Goroshevsky, Nikita Sattarov, Alina Trepacheva:

Acki Nacki: A Probabilistic Proof-of-Stake Consensus Protocol with Fast Finality and Parallelisation. 43-62
AIHWS - Artificial Intelligence in Hardware Security
- Tatsuya Oyama, Mika Sakai, Yohei Hori

, Toshihiro Katashita, Takeshi Fujino:
FPGA Implementation of Physically Unclonable Functions Based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling Attacks. 65-83 - Yuta Fukuda

, Kota Yoshida
, Takeshi Fujino
:
Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel Attacks. 84-101 - Trevor Yap

, Dirmanto Jap
:
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack. 102-120 - Marina Krcek, Thomas Ordas:

Diversity Algorithms for Laser Fault Injection. 121-138 - Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin:

One for All, All for Ascon: Ensemble-Based Deep Learning Side-Channel Analysis. 139-157 - Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:

CNN Architecture Extraction on Edge GPU. 158-175 - Georgios Kokolakis, Athanasios Moschos, Angelos D. Keromytis:

Harnessing the Power of General-Purpose LLMs in Hardware Trojan Design. 176-194 - Gabriele Serafini, Léo Weissbart, Lejla Batina:

Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework. 195-212
AIoTS - Artificial Intelligence and Industrial IoT Security
- Chuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy, Darren Ng Wei Hong, Jianying Zhou:

Device Fingerprinting in a Smart Grid CPS. 215-234 - Mazhar Ali

, Ajit Kumar
, Bong Jun Choi
:
Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning. 235-245 - Alex Baron, Laurens Le Jeune, Wouter Hellemans, Md Masoom Rabbani, Nele Mentens

:
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT. 246-264 - Adeola Adewumi, Mohammad Hammoudeh

, Tooska Dargahi, Olamide Jogunola
:
Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures. 265-280
SCI - Secure Cryptographic Implementation
- Xiaodong Ye, Teik Guan Tan, Jianying Zhou:

Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries. 283-302 - Peter Cíbik

, Patrik Dobias
, Sara Ricci
, Jan Hajny
, Lukas Malina
, Petr Jedlicka
, David Smekal
:
Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests. 303-318 - Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang:

Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits. 319-339 - Xue Yang, Congming Wei, Yaoling Ding, Shaofei Sun, An Wang, Jiazhe Chen:

A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework. 340-358 - Yaoyuan Hu, An Wang, Weiping Gong, Jingjie Wu, Ziyu Wang, Shiming Zhang, Shufan Ma:

Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems. 359-375 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani:

Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4. 376-395

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














