


default search action
ICSP 2024: Jamshedpur, India
- Sihem Mesnager

, Pantelimon Stanica
, Sumit Kumar Debnath
:
Security and Privacy - 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings. Communications in Computer and Information Science 2489, Springer 2025, ISBN 978-3-031-90586-5
Cryptanalysis and Other Attacks
- Akanksha Singh

, Harish Chandra
, Saurabh Rana
:
SIS-Based Signature Schemes and Their Countermeasures: From Vulnerability to Vigilance. 3-12 - Ramprasad Sarkar

, Utkarsh Sahai
, Mriganka Mandal
:
On the Security of AMRIBE, Anonymous Multi-receiver Identity-Based Encryption. 13-27 - Kuldeep Namdeo

, Dheerendra Mishra
, Namita Srivastava
:
Algebraic Cryptanalysis and Countermeasures of Lightweight Signature Scheme Based on Multivariate Quadratic Polynomials. 28-43
Boolean Functions
- Zeenath A. U., K. V. Lakshmy

, Chungath Srinivasan
:
Construction of Boolean Functions with 2k-Valued Walsh Spectrum and High Nonlinearity. 47-61 - Suman Dutta

, Aarav Jaiswal, Subhamoy Maitra, Debasish Roy:
On (Noisy) Simon's (Quantum) Algorithm for Multi-shift Boolean Functions. 62-76
Authentication and Authorization, Cyber-physical Systems Security, Privacy-preserving Technologies
- Nilin Prabhaker, Rahul Maurya

, Ghanshyam S. Bopche
, Michael Arock
:
Generation of Believable Fake Integral Equations for Cyber Deception. 79-93 - Teodor-Cosmin Curcudel

:
A Security and Privacy Model for Automotive. 94-108 - Manish Kumar Pandit, Sangram Ray

, Priyanka Das
:
MAP-ECC: Mutual Authentication Protocol for e-Agriculture Using ECC. 109-124
Blockchain and Cryptocurrency, IoT Security and Privacy, Database Security
- Gatram Sravan Kumar, Kamalakanta Sethi, Piyush Joshi, Padmalochan Bera:

Robust Image Steganography: A SLIC and QWT-Based Approach for Secure Data Embedding. 127-141 - Narendra Kumar Ch

, Dinesh Kumar
, Amit Prakash
:
A Secure and Decentralized EHR System Using Blockchain and IPFS. 142-153 - V. Valli Kumari, Y. Prasanna Kumar:

SQL Injection Detection Using Recurrent Neural Networks (RNN). 154-167
Quantum Cryptography
- Soumen Bajpayee, Sarbani Sen

, Prithwish Dey, Imon Mukherjee
:
A Quantum Public Key Cryptographic Scheme Using Entangled States and Grover Operator. 171-181 - Vikas Srivastava, Tapaswini Mohanty, Y. Sreenivasa Rao:

An Efficient and Secure Quantum Group Signature with Applications to Vehicular Ad Hoc Networks. 183-194

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














