default search action
24th ISC 2021: Virtual Event
- Joseph K. Liu, Sokratis K. Katsikas, Weizhi Meng, Willy Susilo, Rolly Intan:
Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings. Lecture Notes in Computer Science 13118, Springer 2021, ISBN 978-3-030-91355-7
Cryptology
- Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu, Yang Tao, Yongbin Zhou:
Integer LWE with Non-subgaussian Error and Related Attacks. 3-25 - Teik Guan Tan, Jianying Zhou:
Layering Quantum-Resistance into Classical Digital Signature Algorithms. 26-41 - Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. 42-53 - Jiqiang Lu, Jingyu Li:
Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher. 54-69 - Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld, Raj Gaire, Shangqi Lai:
A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data. 70-94 - Bowen Liu, Qiang Tang, Jianying Zhou:
Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT. 95-116 - Xinyan Wang, Fuyou Miao:
Randomized Component Based Secure Secret Reconstruction in Insecure Networks. 117-138 - Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
Transparency Order of (n, m)-Functions - Its Further Characterization and Applications. 139-157
Web and OS Security
- Seyed Ali Akhavani, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu:
Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy. 161-176 - Xiaobo Yu, Weizhi Meng, Lei Zhao, Yining Liu:
TridentShell: a Covert and Scalable Backdoor Injection Attack on Web Applications. 177-194 - Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis:
Andromeda: Enabling Secure Enclaves for the Android Ecosystem. 195-217
Network Security
- Andreas Schaad, Dominik Binder:
FEX - A Feature Extractor for Real-Time IDS. 221-237 - Rikima Mitsuhashi, Akihiro Satoh, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai:
Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification. 238-256
Detection of Malware, Attacks and Vulnerabilities
- Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, Apostolis Zarras:
Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic. 259-278 - Hugo Sbai, Jassim Happa, Michael Goldsmith:
A Novel Behavioural Screenlogger Detection System. 279-295 - Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa:
sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning. 296-319 - Hao Sun, Yanjun Tong, Jing Zhao, Zhaoquan Gu:
DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-Architecture Firmware Vulnerability Detection. 320-337
Machine Learning for Security
- Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. 341-357 - Wei Zong, Yang-Wai Chow, Willy Susilo, Santu Rana, Svetha Venkatesh:
Targeted Universal Adversarial Perturbations for Automatic Speech Recognition. 358-373 - Panpan Lu, Qi Li, Hui Zhu, Giuliano Sovernigo, Xiaodong Lin:
Voxstructor: Voice Reconstruction from Voiceprint. 374-397 - Futai Zou, Qianying Shen, Yuzong Hu:
Word-Map: Using Community Detection Algorithm to Detect AGDs. 398-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.