


default search action
26th ISC 2023: Groningen, The Netherlands
- Elias Athanasopoulos, Bart Mennink:

Information Security - 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings. Lecture Notes in Computer Science 14411, Springer 2023, ISBN 978-3-031-49186-3
Privacy
- Manel Slokom, Peter-Paul de Wolf, Martha A. Larson:

Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks. 3-23 - Pronaya Prosun Das

, Despina Tawadros
, Lena Wiese
:
Privacy-Preserving Medical Data Generation Using Adversarial Learning. 24-41 - Bingchang He

, Atsuko Miyaji
:
Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning. 42-56
Intrusion Detection and Systems
- Songyue Chen

, Rong Yang, Hong Zhang, Hongwei Wu, Yanqin Zheng, Xingyu Fu, Qingyun Liu:
SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection. 59-78 - Yan Lin Aung

, Shanshan Wang
, Wang Cheng
, Sudipta Chattopadhyay
, Jianying Zhou
, Anyu Cheng
:
VNGuard: Intrusion Detection System for In-Vehicle Networks. 79-98 - Wei Chen, Huaijin Wang

, Weixi Gu, Shuai Wang:
RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing. 99-118
Machine Learning
- Hailong Hu

, Jun Pang
:
Loss and Likelihood Based Membership Inference of Diffusion Models. 121-141 - Blerta Lindqvist

:
Symmetry Defense Against CNN Adversarial Perturbation Attacks. 142-160
Web Security
- Nico Weidmann, Thomas Barber

, Christian Wressnegger
:
Load-and-Act: Increasing Page Coverage of Web Applications. 163-182 - Valerio Bucci

, Wanpeng Li
:
From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions. 183-202
Mobile Security and Trusted Execution
- David A. Tomassi

, Kenechukwu Nwodo
, Mohamed Elsabagh
:
Libra: Library Identification in Obfuscated Android Apps. 205-225 - Fatemeh Nezhadian

, Enrico Branca
, Natalia Stakhanova
:
Certificate Reuse in Android Applications. 226-245 - Gilang Mentari Hamidy

, Sri Yulianti
, Pieter Philippaerts
, Wouter Joosen
:
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. 246-264
Post-Quantum Cryptography
- Johanna Henrich

, Andreas Heinemann
, Alexander Wiesmaier
, Nicolai Schmitt
:
Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics. 267-287 - Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin:

Protecting Private Keys of Dilithium Using Hardware Transactional Memory. 288-306
Multiparty Computation
- Luke Harmon

, Gaetan Delavignette
:
Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals. 309-326 - Naty Peter:

Evolving Conditional Disclosure of Secrets. 327-347
Symmetric Cryptography
- Yukihito Hiraga, Yusuke Naito, Yu Sasaki, Takeshi Sugawara:

Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size. 351-371 - Jiqiang Lu, Xiao Zhang:

Impossible Differential Cryptanalysis of the FBC Block Cipher. 372-391 - Benqiang Wei

, Ruida Wang
, Zhihao Li
, Qinju Liu
, Xianhui Lu:
Fregata: Faster Homomorphic Evaluation of AES via TFHE. 392-412
Key Management
- Li Duan

, Yong Li, Lijun Liao:
Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography. 415-434 - Li Duan

, Yong Li:
On the Privacy-Preserving Infrastructure for Authenticated Key Exchange. 435-454 - Colin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord:

Hybrid Group Key Exchange with Application to Constrained Networks. 455-472
Functional and Updatable Encryption
- Jodie Knapp

, Elizabeth A. Quaglia
:
Dynamic Multi-server Updatable Encryption. 475-495 - Qiuwei Zheng

, Jun Zhao
:
Trace-and-Revoke Quadratic Functional Encryption. 496-515 - Ming Wan, Geng Wang, Shifeng Sun, Dawu Gu:

Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings. 516-534
Signatures, Hashes, and Cryptanalysis
- Keyang Liu

, Xingxin Li
, Tsuyoshi Takagi:
Robust Property-Preserving Hash Meets Homomorphism. 537-556 - Xin Liu

, Joonsang Baek
, Willy Susilo
:
Withdrawable Signature: How to Call Off a Signature. 557-577 - Yu Wei

, Lei Bi, Kunpeng Wang, Xianhui Lu:
An Improved BKW Algorithm for Solving LWE with Small Secrets. 578-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














