


default search action
18th SECRYPT 2021
- Sabrina De Capitani di Vimercati, Pierangela Samarati:

Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021. SCITEPRESS 2021, ISBN 978-989-758-524-1
Invited Speakers
- Jaideep Vaidya:

Privacy-Preserving Analytics in the Big Data Environment. SECRYPT 2021: 5 - V. S. Subrahmanian:

VEST: An Early Warning System for Future Cyber-Attacks. SECRYPT 2021: 7 - Ravi S. Sandhu:

Access Control Convergence: Challenges and Opportunities. SECRYPT 2021: 9
Papers
- Cyrius Nugier, Diane Leblanc-Albarel

, Agathe Blaise, Simon Masson, Paul Huynh, Yris Brice Wandji Piugie:
An Upcycling Tokenization Method for Credit Card Numbers. 15-25 - Stephan Seifermann, Robert Heinrich, Dominik Werle, Ralf H. Reussner

:
A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures. 26-37 - Kaspar Hageman

, Egon Kidmose
, René Rydhof Hansen
, Jens Myrup Pedersen
:
Can a TLS Certificate Be Phishy? 38-49 - Milan Lopuhaä-Zwakenberg

, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone
:
Comparing Classifiers' Performance under Differential Privacy. 50-61 - Thomas Groß:

Hashing to Prime in Zero-Knowledge. 62-74 - Denis Firsov, Henri Lakk, Sven Laur, Ahto Truu:

BLT+L: Efficient Signatures from Timestamping and Endorsements. 75-86 - Florian Thaeter, Rüdiger Reischuk:

Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss. 87-98 - Héloïse Maurel, Santiago A. Vidal

, Tamara Rezk:
Statically Identifying XSS using Deep Learning. 99-110 - Muhammad I. H. Sukmana, Kai-Oliver Kohlen, Carl Gödecken, Pascal Schulze, Christoph Meinel:

Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems. 111-124 - Vasilios Koutsokostas, Constantinos Patsakis:

Python and Malware: Developing Stealth and Evasive Malware without Obfuscation. 125-136 - Andreas Abraham, Christopher Schinnerl, Stefan More

:
SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance. 137-148 - Felix Hörandner

, Bernd Prünster
:
Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation. 149-160 - Panagiotis Dedousis, George Stergiopoulos

, George Arampatzis, Dimitris Gritzalis:
Towards Integrating Security in Industrial Engineering Design Practices. 161-172 - Hannah Keller, Helen Möllering, Thomas Schneider

, Hossein Yalame:
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation. 173-184 - Marino Miculan

, Nicola Vitacolonna:
Automated Symbolic Verification of Telegram's MTProto 2.0. 185-197 - Mario Lilli

, Chiara Braghin, Elvinia Riccobene:
Formal Proof of a Vulnerability in Z-Wave IoT Protocol. 198-209 - Karl Norrman

, Vaishnavi Sundararajan, Alessandro Bruni:
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices. 210-221 - Marco Pernpruner

, Giada Sciarretta, Silvio Ranise:
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments. 222-233 - Marius Schlegel

, Peter Amthor:
The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. SECRYPT 2021: 234-246 - Jeffrey Todd McDonald, Ramya Manikyam, Sébastien Bardin

, Richard Bonichon, Todd R. Andel:
Program Protection through Software-based Hardware Abstraction. 247-258 - Ibifubara Iganibo

, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito:
Vulnerability Metrics for Graph-based Configuration Security. 259-270 - Md. Morshedul Islam

, Reihaneh Safavi-Naini:
Model Inversion for Impersonation in Behavioral Authentication Systems. 271-282 - Nazim Uddin Sheikh

, Zhigang Lu, Hassan Asghar
, Mohamed Ali Kâafar
:
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. 283-294 - Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi:

Preventing Watermark Forging Attacks in a MLaaS Environment. 295-306 - Michael Tunstall

, Louiza Papachristodoulou, Kostas Papagiannopoulos:
Boolean Exponent Splitting. 321-332 - Evgeniy O. Kiktenko

, Mikhail A. Kudinov
, Andrey A. Bulychev, Aleksey K. Fedorov:
Proof-of-Forgery for Hash-based Signatures. 333-342 - Marius Schlegel

:
Trusted Enforcement of Application-specific Security Policies. 343-355 - Jennifer Bellizzi, Mark Vella

, Christian Colombo, Julio C. Hernandez-Castro:
Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android. 356-369 - Stefano Berlato

, Roberto Carbone, Silvio Ranise:
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment. 370-381 - Kees Leune, Sung Kim:

Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling. 385-394 - George Teseleanu

:
Signer and Message Ambiguity from a Variety of Keys. 395-402 - Nicolas Bailluet, Hélène Le Bouder, David Lubicz:

Ransomware Detection using Markov Chain Models over File Headers. 403-411 - Efe Ulas Akay Seyitoglu, Attila Altay Yavuz

, Thang Hoang:
Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work. 412-419 - Murat Burhan Ilter

, Ali Aydin Selçuk:
A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE. 420-427 - Carlos Villarán, Marta Beltrán:

Protecting End User's Privacy When using Social Login through GDPR Compliance. 428-435 - Erwin Hoogerwerf, Daphne van Tetering, Aslí Bay, Zekeriya Erkin

:
Efficient Joint Random Number Generation for Secure Multi-party Computation. 436-443 - Daniel Demmler

, Stefan Katzenbeisser, Thomas Schneider
, Tom Schuster, Christian Weinert:
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. 444-451 - Basant Subba, Ayushi Singh:

A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation. 452-459 - Pål Ellingsen, Constanza Riera, Pantelimon Stanica, Anton Tkachenko

:
An Extension of the Avalanche Criterion in the Context of c-Differentials. 460-467 - Anass Sbai, Cyril Drocourt

, Gilles Dequen:
A New Delegated Authentication Protocol based on PRE. 468-478 - Rosangela Casolare, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

Mobile Family Detection through Audio Signals Classification. 479-486 - Benoît Fournier, Valérie Viet Triem Tong, Gilles Guette:

Accurate Measurement of the Energy Consumption of Security Functions. 487-494 - Ferucio Laurentiu Tiplea, Cristian Hristea:

Practically Efficient RFID Scheme with Constant-time Identification. 495-506 - Hiroki Okada

, Shinsaku Kiyomoto, Carlos Cid:
A Comparison of GKE Protocols based on SIDH. 507-514 - Aslí Bay, Zeki Erkin

, Mina Alishahi, Jelle Vos:
Multi-Party Private Set Intersection Protocols for Practical Applications. 515-522 - Rasmus Hagberg, Martin Hell, Christoph Reichenbach

:
Using Program Analysis to Identify the Use of Vulnerable Functions. 523-530 - Fabien Herbaut, Nicolas Méloni, Pascal Véron:

Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains. 531-539 - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal

:
Secure Computation by Secret Sharing using Input Encrypted with Random Number. 540-547 - Chloe Tartan, Craig Wright, Michaella Pettit, Wei Zhang:

A Scalable Bitcoin-based Public Key Certificate Management System. 548-559 - Jaouhara Bouamama, Mustapha Hedabou, Mohammed Erradi:

Cloud Key Management using Trusted Execution Environment. 560-567 - Gustavo Gonzalez Granadillo, Alejandro G. Bedoya

, Rodrigo Diaz:
An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning Algorithms. 568-575 - Marcin Gregorczyk

, Wojciech Mazurczyk:
Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach. 576-586 - Parjanya Vyas, R. K. Shyamasundar:

SecSDN: A Novel Architecture for a Secure SDN. 587-594 - Ratna Dutta, Sumit Kumar Debnath

, Chinmoy Biswas
:
Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem. 595-602 - Nils Mäurer, Christoph Gentsch, Thomas Gräupl, Corinna Schmitt:

Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS. 603-610 - Christophe Nègre:

Side Channel Counter-measures based on Randomized AMNS Modular Multiplication. 611-619 - Sara Foresti, Giovanni Livraga:

Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation. 620-627 - Wojciech Wodo

, Damian Stygar
, Przemyslaw Blaskiewicz:
Security Issues of Electronic and Mobile Banking. 631-638 - Sohail Rajdev, Barsha Mitra:

Enforcing Cardinality Constraint in Temporal RBAC. 639-646 - Nadia Hocine, Ismail Bokhari:

Dynamic Access Control Framework for Enterprise Content Management Systems. 647-652 - Pritam Pallab, Abhijit Das:

AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method. 653-658 - Julius Hekkala

, Sara Nikula
, Outi-Marja Latvala
, Kimmo Halunen:
Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC. 659-664 - I Wayan Budi Sentana

, Muhammad Ikram
, Mohamed Ali Kâafar
, Shlomo Berkovsky
:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. 665-673 - I Wayan Budi Sentana

, Muhammad Ikram
, Mohamed Ali Kâafar
:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. 674-679 - Ionita Andreea:

Private Set Intersection: Past, Present and Future. 680-685 - Marinos Tsantekidis

, Vassilis Prevelakis:
MMU-based Access Control for Libraries. 686-691 - Kaito Uemura, Satoshi Obana:

Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack. 692-697 - Sourav Roy

, Dipnarayan Das, Anindan Mondal
, Mahabub Hasan Mahalat
, Suchismita Roy, Bibhash Sen:
PUF based Lightweight Authentication and Key Exchange Protocol for IoT. 698-703 - Anne V. D. M. Kayem, Nikolai J. Podlesny, Christoph Meinel:

On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service. 704-714 - Mathias P. M. Parisot, Balázs Pejó

, Dayana Spagnuelo:
Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model's Complexity. 715-721 - Mujahid Muhammad, Paul Kearney, Adel Aneiba, Junaid Arshad, Andreas Kunz:

RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications. 722-727 - Mateusz Kozlowski, Bogdan Ksiezopolski:

A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks. 728-733 - Grzegorz J. Blinowski, Pawel Piotrowski, Michal Wisniewski:

Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities. 734-740 - Takoua Guiga, Jean-Jacques Schwartzmann, Christophe Rosenberger

:
Privacy Aura for Transparent Authentication on Multiple Smart Devices. 741-746 - Denis Migdal, Ilaria Magotti, Christophe Rosenberger

:
Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics. 747-753 - Jacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski:

Fair Mutual Authentication. 754-759 - Sara Ricci

, Petr Jedlicka, Peter Cíbik, Petr Dzurenda
, Lukas Malina, Jan Hajny:
Towards CRYSTALS-Kyber VHDL Implementation. 760-765 - Pascal Lafourcade, Léo Robert, Demba Sow

:
Fast Cramer-Shoup Cryptosystem. 766-771 - Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, Ghaleb Hoblos, Leïla Azouz Saïdane:

RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network. 772-778 - Piotr Kawa, Piotr Syga

:
Verify It Yourself: A Note on Activation Functions' Influence on Fast DeepFake Detection. 779-784 - Milan Cermák

, Denisa Sramkova:
GRANEF: Utilization of a Graph Database for Network Forensics. 785-790 - Raul Casanova Marques, Pavel Pascacio

, Jan Hajny, Joaquín Torres-Sospedra
:
Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems. 791-797 - Yaw Frempong, Yates Snyder, Erfan Al-Hossami, Meera Sridhar, Samira Shaikh:

HIJaX: Human Intent JavaScript XSS Generator. 798-805 - Thomas Marchioro, Andrei Kazlouski, Evangelos P. Markatos:

User Identification from Time Series of Fitness Data. 806-811 - Hiral S. Trivedi, Sankita J. Patel:

Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things. 812-818 - Mitsuhiro Mabuchi, Koji Hasebe:

C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments. 819-826 - Salimeh Dashti, Anderson Santana de Oliveira, Caelin Kaplan, Manuel Dalcastagné

, Silvio Ranise:
Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment? 827-832 - Christophe Ponsard, Valéry Ramon, Jean-Christophe Deprez:

Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434. 833-838 - Wisnu Uriawan, Omar Hasan, Youakim Badr, Lionel Brunie:

Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp). 839-844 - Mark Dockendorf, Ram Dantu, Kirill Morozov, Sanjukta Bhowmick:

Investing Data with Untrusted Parties using HE. 845-853 - Colby Parker, Jeffrey Todd McDonald, Dimitrios Damopoulos:

Machine Learning Classification of Obfuscation using Image Visualization. 854-859

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














