


default search action
20th SECRYPT 2023: Rome, Italy
- Sabrina De Capitani di Vimercati, Pierangela Samarati:

Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023. SCITEPRESS 2023, ISBN 978-989-758-666-8
Invited Speakers
- Rigo Wenning:

The Certification Panacea. SECRYPT 2023: 5 - Patrick Kochberger

, Maximilian Gramberger, Sebastian Schrittwieser
, Caroline Lawitschka, Edgar R. Weippl
:
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code. 7-19
Papers
- David Schrammel, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham

, Martin Unterguggenberger
, Pascal Nasahl, Stefan Mangard
:
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware. 25-36 - Sonakshi Garg, Vicenç Torra

:
K-Anonymous Privacy Preserving Manifold Learning. 37-48 - Axel Rousselot, Nora Cuppens, Samra Bouakkaz:

AIS Authentication Using Certificateless Cryptography. 49-61 - Trisha Chakraborty, Shaswata Mitra, Sudip Mittal:

CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense. 62-72 - Francesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro:

Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications. 73-84 - Muhammad Nauman Khan

, Asha Rao
, Seyit Camtepe, Josef Pieprzyk:
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme. 85-98 - Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He

:
ZT-NIDS: Zero Trust, Network Intrusion Detection System. 99-110 - Zeynep Sila Kaya, Mehmet Emre Gursoy:

On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data. 111-122 - Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Amir Sharif

, Alessandro Tomasi
:
A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials. 123-134 - Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic:

BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments. 135-146 - Thomas Schneider

, Hossein Yalame, Michael Yonli:
Griffin: Towards Mixed Multi-Key Homomorphic Encryption. 147-158 - Md. Al Amin

, Amani Altarawneh, Indrajit Ray:
Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach. 159-170 - Nicolas Chiapputo, Yvo Desmedt, Kirill Morozov

:
Using Untrusted and Unreliable Cloud Providers to Obtain Private Email. 171-182 - Olutola Adebiyi, Massimiliano Albanese:

Towards Usable Scoring of Common Weaknesses. 183-191 - Mark Dockendorf, Ram Dantu:

Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives. 192-205 - Clémentine Gritti, Frédéric A. Hayek, Pascal Lafourcade:

Generic Blockchain on Generic Human Behavior. 206-217 - Alexandru Ionita:

Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures. 230-241 - Guillaume Gagnon

, Sébastien Gambs, Mathieu Cunche:
RSSI-Based Fingerprinting of Bluetooth Low Energy Devices. 242-253 - Maryam Sheikhi, Rosario Giustolisi, Carsten Schürmann:

Receipt-Free Electronic Voting from zk-SNARK. SECRYPT 2023: 254-266 - Davide Agostinello, Angelo Genovese

, Vincenzo Piuri:
Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques. 267-275 - Kayode S. Adewole

, Vicenç Torra
:
Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks. 279-286 - Libor Polcák

, Marek Salon, Giorgio Maone, Radek Hranický
, Michael McMahon:
JShelter: Give Me My Browser Back. 287-294 - George Teseleanu:

Threshold Cryptosystems Based on 2^k-th Power Residue Symbols. 295-302 - Motonari Honda, Yuichi Kaji:

Improvement of Winternitz OTS with a Novel Fingerprinting Function. 303-311 - Joshua Stock

, Jens Wettlaufer, Daniel Demmler, Hannes Federrath:
Lessons Learned: Defending Against Property Inference Attacks. 312-323 - Giuseppe Cascavilla

, Gemma Catolino, Mauro Conti
, Dimos Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. 324-334 - Arjun Prasad, Kevin Kanichery Biju, Soumya Somani, Barsha Mitra:

Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis. SECRYPT 2023: 335-344 - Alexander Mühle, Katja Assaf, Christoph Meinel:

One to Bind Them: Binding Verifiable Credentials to User Attributes. 345-352 - George Teseleanu:

A Note on a CBC-Type Mode of Operation. 353-360 - Mustapha Benssalah, Karim Drouiche:

On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication. 361-368 - Sehrish Shafeeq, Mathias Fischer:

SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme. 369-376 - Argiro Anagnostopoulou, Ioannis Mavridis, Dimitris Gritzalis:

Risk-Based Illegal Information Flow Detection in the IIoT. 377-384 - Amine Hattak

, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning. 385-393 - Rocco Zaccagnino, Antonio Cirillo, Alfonso Guarino, Nicola Lettieri

, Delfina Malandrino, Gianluca Zaccagnino:
Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks. 394-401 - El Mahdi Mercha, El Mostapha Chakir

, Mohammed Erradi:
Trans-IDS: A Transformer-Based Intrusion Detection System. 402-409 - Angelica Marotta, Stuart E. Madnick:

Regulating Cyber Incidents: A Review of Recent Reporting Requirements. 410-416 - Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong:

BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports. 417-424 - Shubham Raj, Snehil Joshi, Kannan Srinathan:

PIUDI: Private Information Update for Distributed Infrastructure. 425-432 - Gerald Palfinger

:
OCScraper: Automated Analysis of the Fingerprintability of the iOS API. 433-441 - Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:

XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement. 442-449 - Kevin Shi, Sherif Saad:

Automated Feature Engineering for AutoML Using Genetic Algorithms. 450-459 - Roland Czerny

, Christian Kollmann, Blaz Podgorelec
, Bernd Prünster
, Thomas Zefferer
:
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems. 460-468 - Ghada Almashaqbeh, Rohit Chatterjee:

Unclonable Cryptography: A Tale of Two No-Cloning Paradigms. 469-477 - Mohamed Salah Azzaz, Redouane Kaibou, Hamdane Kamelia, Abdenour Kifouche, Djamel Teguig:

Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption. 478-485 - David Schatz

, Friedrich Altheide
, Hedwig Koerfgen
, Michael Rossberg, Guenter Schaefer:
Virtual Private Networks in the Quantum Era: A Security in Depth Approach. 486-494 - Catalin V. Bîrjoveanu, Mirela Bîrjoveanu:

Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries. 495-502 - Navya Sivaraman

, Simin Nadjm-Tehrani:
5G Handover: When Forward Security Breaks. 503-510 - Wisam Abbasi

, Paolo Mori, Andrea Saracino:
The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis. 511-519 - Quentin L. Meunier, Abdul Rahman Taleb:

VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations. 520-527 - Syed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage:

A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things. 528-539 - Matluba Khodjaeva, Giovanni Di Crescenzo:

On Single-Server Delegation Without Precomputation. 540-547 - Pascal Wichmann

, Sam Ansari, Hannes Federrath, Jens Lindemann
:
WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers. 548-556 - Rudrapatna K. Shyamasundar:

ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract. 557-566 - Sangita Roy, Rudrapatna K. Shyamasundar:

A Rand Index-Based Analysis of Consensus Protocols. 567-576 - Sudipta Paul, Vicenç Torra

:
Δ SFL: (Decoupled Server Federated Learning) to Utilize DLG Attacks in Federated Learning by Decoupling the Server. 577-584 - Sara Nikula

, Pekka Koskela, Outi-Marja Latvala
, Sami Lehtonen
:
Light Quantum Key Distribution Network Security Estimation Tool. 587-596 - Hesamodin Mohammadian, Arash Habibi Lashkari

, Ali A. Ghorbani:
Evaluating Label Flipping Attack in Deep Learning-Based NIDS. 597-603 - Laurent Gomez, Francesco Capano, Patrick Duverger:

Security for Next-Gen Analytics for Cross-Organisation Collaboration. 604-609 - Arne Roar Nygård, Sokratis K. Katsikas:

Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid. 610-616 - Mikael Carmona

, Doryan Lesaignoux, Antoine Loiseau:
On the Implementation of a Lattice-Based Revocable Hierarchical Ibe. 617-623 - Lucas Lange, Maja Schneider, Peter Christen, Erhard Rahm:

Privacy in Practice: Private COVID-19 Detection in X-Ray Images. 624-633 - Cong-Binh Le, Bao-Thi Nguyen-Le, Phuoc-Loc Truong, Minh-Triet Tran, Anh-Duy Tran

:
ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development. 634-641 - Balázs Pejó, Nikolett Kapui:

SQLi Detection with ML: A Data-Source Perspective. 642-648 - Brian Lewandowski:

Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets. 649-658 - Janaka Senanayake

, Harsha K. Kalutarage
, M. Omar Al-Kadri, Luca Piras, Andrei Petrovski:
Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models. 659-666 - Mofareh Waqdan

, Habib Louafi, Malek Mouhoub:
A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment. 667-672 - Arijit Karati

, Yu-Sheng Chang, Ting-Yu Chen:
Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices. 673-682 - Libor Polcák

, Kamil Jerábek:
Data Protection and Security Issues with Network Error Logging. 683-690 - Catalin Rus, Dipti Kapoor Sarmah, Mohammed El-Hajj

:
Defeating MageCart Attacks in a NAISS Way. 691-697 - Laltu Sardar

, Subhra Mazumdar:
Fidelis: Verifiable Keyword Search with No Trust Assumption. 698-703 - Marina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga:

Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys. 704-709 - Shabnam Khanna, Ciara Rafferty:

Approximate Homomorphic Pre-Processing for CNNs. 710-715 - Jan Marius Evang:

A 10-Layer Model for Service Availability Risk Management. 716-723 - Patrik Dobias, Sara Ricci, Petr Dzurenda, Lukas Malina, Nikita Snetkov

:
Lattice-Based Threshold Signature Implementation for Constrained Devices. 724-730 - Shahzad Ahmad

, Stefan Rass
:
How to Plausibly Deny Steganographic Secrets. 731-737 - Waheeb Yaqub, Manoranjan Mohanty, Basem Suleiman

:
Proctoring Online Exam Using Eye Tracking. 738-745 - Roberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo:

Blockchain Data Replication. 746-751 - Dario Castellano, Roberto De Prisco, Pompeo Faruolo:

Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility. 752-757 - Biagio Boi

, Marco De Santis
, Christian Esposito:
Self-Sovereign Identity (SSI) Attribute-Based Web Authentication. 758-763 - Satoshi Kai

, Takao Kondo
, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka:
International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed "Hakoniwa". 764-771 - Amani Bacha

, Farah Barika Ktata
, Faten Louati:
Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized Approaches. 772-777 - Matous Kozák, Martin Jurecek

:
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. 778-786 - Achyuth Nandikotkur, Issa Traoré, Mohammad Mamun:

Detecting BrakTooth Attacks. 787-792 - Hiroki Okada, Kazuhide Fukushima:

SoK: Towards CCA Secure Fully Homomorphic Encryption. 793-798 - Jaroslaw Bernacki

, Rafal Scherer:
IMAGINE Dataset: Digital Camera Identification Image Benchmarking Dataset. 799-804 - Kazutaka Matsuzaki, Kenji Sawada, Shinichi Honiden:

Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis. 805-812 - Wenhao Li

, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda:
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. 813-821 - Aimen Mahmood, Haider Abbas, M. Faisal Amjad:

CNN-HMM Model for Real Time DGA Categorization. 822-829 - Hasina Rahman, Priyadarsi Nanda, Manoranjan Mohanty, Nazim Uddin Sheikh:

Anomaly Detection in Smart Grid Networks Using Power Consumption Data. 830-837 - Laurent Gomez, Tianchi Yu, Patrick Duverger:

Security for Distributed Machine Learning. 838-843 - Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:

A Secure Emergency Framework in an IoT Based Patient Monitoring System. 844-849 - ChihYun Chuang, IHung Hsu, TingFang Lee

:
A Two-Party Hierarchical Deterministic Wallets in Practice. 850-856 - Alexandre Augusto Giron

:
Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement. 857-862 - Chirag Jaju, Dhairya Agrawal, Rishi Poddar, Shubh Badjate, Sidharth Anand

, Barsha Mitra, Soumyadeep Dey:
Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration. 863-869 - Myria Bouhaddi

, Kamel Adi
:
Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning. 870-875 - Mark Dockendorf, Ram Dantu:

Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs. 876-884

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














