researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
XML
XML Schema
access control
analysis
architecture
data-flow
design
e-science
meta-model
meta-objects
mobile
multimedia
protocol
rule-based
security
systematic-approach
watermarking
web service
Filter by Author
[+]
OR
AND
NOT
1
Alberto Ferrante
C. Pandu Rangan
Christophe Guyeux
Christophe Nègre
Dimitris Gritzalis
Dipanwita Roy Chowdhury
Esther Palomar
Francesco Mercaldo
Jan Hajny
Lukas Malina
Mario Piattini
Maryline Laurent
Nesrine Kaaniche
Pascal Lafourcade 0001
Petr Svenda
Sebastian Obermeier
Shinsaku Kiyomoto
Silvio Ranise
Stefan Rass
Toshiaki Tanaka
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
approach
attacks
authentication
control
data
detection
efficient
encryption
key
network
networks
privacy
scheme
secure
security
system
systems
using
SECRYPT (secrypt)
Editions
Publications
Viewing Publication 1 - 100 from 1077
2023
SoK: Towards CCA Secure Fully Homomorphic Encryption
Hiroki Okada 0001
,
Kazuhide Fukushima
.
secrypt 2023
:
793-798
[doi]
Griffin: Towards Mixed Multi-Key Homomorphic Encryption
Thomas Schneider 0003
,
Hossein Yalame
,
Michael Yonli
.
secrypt 2023
:
147-158
[doi]
The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis
Wisam Abbasi
,
Paolo Mori
,
Andrea Saracino
.
secrypt 2023
:
511-519
[doi]
Towards Usable Scoring of Common Weaknesses
Olutola Adebiyi
,
Massimiliano Albanese
.
secrypt 2023
:
183-191
[doi]
Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks
Kayode S. Adewole
,
Vicenç Torra
.
secrypt 2023
:
279-286
[doi]
Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques
Davide Agostinello
,
Angelo Genovese
,
Vincenzo Piuri
.
secrypt 2023
:
267-275
[doi]
How to Plausibly Deny Steganographic Secrets
Shahzad Ahmad
,
Stefan Rass
.
secrypt 2023
:
731-737
[doi]
Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach
Md. Al-Amin
,
Amani Altarawneh
,
Indrajit Ray
.
secrypt 2023
:
159-170
[doi]
ZT-NIDS: Zero Trust, Network Intrusion Detection System
Abeer Z. Alalmaie
,
Priyadarsi Nanda
,
Xiangjian He
.
secrypt 2023
:
99-110
[doi]
Unclonable Cryptography: A Tale of Two No-Cloning Paradigms
Ghada Almashaqbeh
,
Rohit Chatterjee
.
secrypt 2023
:
469-477
[doi]
Risk-Based Illegal Information Flow Detection in the IIoT
Argiro Anagnostopoulou
,
Ioannis Mavridis
,
Dimitris Gritzalis
.
secrypt 2023
:
377-384
[doi]
Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption
Mohamed Salah Azzaz
,
Redouane Kaibou
,
Hamdane Kamelia
,
Abdenour Kifouche
,
Djamel Teguig
.
secrypt 2023
:
478-485
[doi]
Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized Approaches
Amani Bacha
,
Farah Barika Ktata
,
Faten Louati
.
secrypt 2023
:
772-777
[doi]
On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
Mustapha Benssalah
,
Karim Drouiche
.
secrypt 2023
:
361-368
[doi]
IMAGINE Dataset: Digital Camera Identification Image Benchmarking Dataset
Jaroslaw Bernacki
,
Rafal Scherer
.
secrypt 2023
:
799-804
[doi]
Self-Sovereign Identity (SSI) Attribute-Based Web Authentication
Biagio Boi
,
Marco De Santis
,
Christian Esposito 0001
.
secrypt 2023
:
758-763
[doi]
Smart Bulbs Can Be Hacked to Hack into Your Household
Davide Bonaventura
,
Sergio Esposito
,
Giampaolo Bella
.
secrypt 2023
:
218-229
[doi]
Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning
Myria Bouhaddi
,
Kamel Adi
.
secrypt 2023
:
870-875
[doi]
Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications
Francesco Buccafurri
,
Vincenzo De Angelis
,
Sara Lazzaro
.
secrypt 2023
:
73-84
[doi]
Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries
Catalin V. Bîrjoveanu
,
Mirela Bîrjoveanu
.
secrypt 2023
:
495-502
[doi]
On the Implementation of a Lattice-Based Revocable Hierarchical Ibe
Mikael Carmona
,
Doryan Lesaignoux
,
Antoine Loiseau
.
secrypt 2023
:
617-623
[doi]
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning
Giuseppe Cascavilla
,
Gemma Catolino
,
Mauro Conti
,
D. Mellios
,
Damian A. Tamburri
.
secrypt 2023
:
324-334
[doi]
Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility
Dario Castellano
,
Roberto De Prisco
,
Pompeo Faruolo
.
secrypt 2023
:
752-757
[doi]
CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense
Trisha Chakraborty
,
Shaswata Mitra
,
Sudip Mittal
.
secrypt 2023
:
62-72
[doi]
Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys
Marina Checri
,
Jean-Paul Bultel
,
Renaud Sirdey
,
Aymen Boudguiga
.
secrypt 2023
:
704-709
[doi]
Using Untrusted and Unreliable Cloud Providers to Obtain Private Email
Nicolas Chiapputo
,
Yvo Desmedt
,
Kirill Morozov
.
secrypt 2023
:
171-182
[doi]
A Two-Party Hierarchical Deterministic Wallets in Practice
ChihYun Chuang
,
IHung Hsu
,
TingFang Lee
.
secrypt 2023
:
850-856
[doi]
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
Roland Czerny
,
Christian Kollmann
,
Blaz Podgorelec
,
Bernd Prünster
,
Thomas Zefferer
.
secrypt 2023
:
460-468
[doi]
Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023
Sabrina De Capitani di Vimercati
,
Pierangela Samarati
, editors,
SCITEPRESS,
2023.
[doi]
Lattice-Based Threshold Signature Implementation for Constrained Devices
Patrik Dobias
,
Sara Ricci
,
Petr Dzurenda
,
Lukas Malina
,
Nikita Snetkov
.
secrypt 2023
:
724-730
[doi]
Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs
Mark Dockendorf
,
Ram Dantu
.
secrypt 2023
:
876-884
[doi]
Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives
Mark Dockendorf
,
Ram Dantu
.
secrypt 2023
:
192-205
[doi]
A 10-Layer Model for Service Availability Risk Management
Jan Marius Evang
.
secrypt 2023
:
716-723
[doi]
A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials
Andrea Flamini
,
Silvio Ranise
,
Giada Sciarretta
,
Mario Scuro
,
Amir Sharif
,
Alessandro Tomasi 0001
.
secrypt 2023
:
123-134
[doi]
RSSI-Based Fingerprinting of Bluetooth Low Energy Devices
Guillaume Gagnon
,
Sébastien Gambs
,
Mathieu Cunche
.
secrypt 2023
:
242-253
[doi]
K-Anonymous Privacy Preserving Manifold Learning
Sonakshi Garg
,
Vicenç Torra
.
secrypt 2023
:
37-48
[doi]
Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement
Alexandre Augusto Giron
.
secrypt 2023
:
857-862
[doi]
Security for Next-Gen Analytics for Cross-Organisation Collaboration
Laurent Gomez
,
Francesco Capano
,
Patrick Duverger
.
secrypt 2023
:
604-609
[doi]
Security for Distributed Machine Learning
Laurent Gomez
,
Tianchi Yu
,
Patrick Duverger
.
secrypt 2023
:
838-843
[doi]
Generic Blockchain on Generic Human Behavior
Clémentine Gritti
,
Frédéric A. Hayek
,
Pascal Lafourcade 0001
.
secrypt 2023
:
206-217
[doi]
A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning
Amine Hattak
,
Giacomo Iadarola
,
Fabio Martinelli
,
Francesco Mercaldo
,
Antonella Santone
.
secrypt 2023
:
385-393
[doi]
Improvement of Winternitz OTS with a Novel Fingerprinting Function
Motonari Honda
,
Yuichi Kaji
.
secrypt 2023
:
303-311
[doi]
Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures
Alexandru Ionita
.
secrypt 2023
:
230-241
[doi]
Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration
Chirag Jaju
,
Dhairya Agrawal
,
Rishi Poddar
,
Shubh Badjate
,
Sidharth Anand
,
Barsha Mitra
,
Soumyadeep Dey
.
secrypt 2023
:
863-869
[doi]
International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed "Hakoniwa"
Satoshi Kai
,
Takao Kondo
,
Naghmeh Karimi
,
Konstantinos Mersinas
,
Marc Sel
,
Roberto Yus
,
Satoru Tezuka
.
secrypt 2023
:
764-771
[doi]
Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices
Arijit Karati
,
Yu-Sheng Chang
,
Ting-Yu Chen
.
secrypt 2023
:
673-682
[doi]
On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data
Zeynep Sila Kaya
,
Mehmet Emre Gursoy
.
secrypt 2023
:
111-122
[doi]
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme
Muhammad Nauman Khan
,
Asha Rao
,
Seyit Camtepe
,
Josef Pieprzyk
.
secrypt 2023
:
85-98
[doi]
Approximate Homomorphic Pre-Processing for CNNs
Shabnam Khanna
,
Ciara Rafferty
.
secrypt 2023
:
710-715
[doi]
On Single-Server Delegation Without Precomputation
Matluba Khodjaeva
,
Giovanni Di Crescenzo
.
secrypt 2023
:
540-547
[doi]
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code
Patrick Kochberger
,
Maximilian Gramberger
,
Sebastian Schrittwieser
,
Caroline Lawitschka
,
Edgar R. Weippl
.
secrypt 2023
:
7-19
[doi]
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
Matous Kozák
,
Martin Jurecek
.
secrypt 2023
:
778-786
[doi]
BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments
Klaudia Krawiecka
,
Simon Birnbach
,
Simon Eberz
,
Ivan Martinovic
.
secrypt 2023
:
135-146
[doi]
Privacy in Practice: Private COVID-19 Detection in X-Ray Images
Lucas Lange
,
Maja Schneider
,
Peter Christen
,
Erhard Rahm
.
secrypt 2023
:
624-633
[doi]
ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development
Cong-Binh Le
,
Bao-Thi Nguyen-Le
,
Phuoc-Loc Truong
,
Minh-Triet Tran
,
Anh Duy Tran
.
secrypt 2023
:
634-641
[doi]
Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets
Brian Lewandowski
.
secrypt 2023
:
649-658
[doi]
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques
Wenhao Li
,
Yongqing He
,
Zhimin Wang
,
Saleh Mansor Alqahtani
,
Priyadarsi Nanda
.
secrypt 2023
:
813-821
[doi]
CNN-HMM Model for Real Time DGA Categorization
Aimen Mahmood
,
Haider Abbas
,
M. Faisal Amjad
.
secrypt 2023
:
822-829
[doi]
Regulating Cyber Incidents: A Review of Recent Reporting Requirements
Angelica Marotta
,
Stuart E. Madnick
.
secrypt 2023
:
410-416
[doi]
Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis
Kazutaka Matsuzaki
,
Kenji Sawada
,
Shinichi Honiden
.
secrypt 2023
:
805-812
[doi]
A Secure Emergency Framework in an IoT Based Patient Monitoring System
Neila Mekki
,
Mohamed Hamdi
,
Taoufik Aguili
,
Tai-Hoon Kim
.
secrypt 2023
:
844-849
[doi]
Trans-IDS: A Transformer-Based Intrusion Detection System
El Mahdi Mercha
,
El Mostapha Chakir
,
Mohammed Erradi
.
secrypt 2023
:
402-409
[doi]
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
Quentin L. Meunier
,
Abdul Rahman Taleb
.
secrypt 2023
:
520-527
[doi]
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement
Aya Mohamed
,
Dagmar Auer
,
Daniel Hofer
,
Josef Küng
.
secrypt 2023
:
442-449
[doi]
Evaluating Label Flipping Attack in Deep Learning-Based NIDS
Hesamodin Mohammadian
,
Arash Habibi Lashkari
,
Ali A. Ghorbani 0001
.
secrypt 2023
:
597-603
[doi]
One to Bind Them: Binding Verifiable Credentials to User Attributes
Alexander Mühle
,
Katja Assaf
,
Christoph Meinel
.
secrypt 2023
:
345-352
[doi]
Detecting BrakTooth Attacks
Achyuth Nandikotkur
,
Issa Traoré
,
Mohammad Mamun 0001
.
secrypt 2023
:
787-792
[doi]
Light Quantum Key Distribution Network Security Estimation Tool
Sara Nikula
,
Pekka Koskela
,
Outi-Marja Latvala
,
Sami Lehtonen
.
secrypt 2023
:
587-596
[doi]
Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid
Arne Roar Nygård
,
Sokratis K. Katsikas
.
secrypt 2023
:
610-616
[doi]
OCScraper: Automated Analysis of the Fingerprintability of the iOS API
Gerald Palfinger
.
secrypt 2023
:
433-441
[doi]
Δ SFL: (Decoupled Server Federated Learning) to Utilize DLG Attacks in Federated Learning by Decoupling the Server
Sudipta Paul
,
Vicenç Torra
.
secrypt 2023
:
577-584
[doi]
SQLi Detection with ML: A Data-Source Perspective
Balázs Pejó
,
Nikolett Kapui
.
secrypt 2023
:
642-648
[doi]
JShelter: Give Me My Browser Back
Libor Polcák
,
Marek Salon
,
Giorgio Maone
,
Radek Hranický
,
Michael McMahon
.
secrypt 2023
:
287-294
[doi]
Data Protection and Security Issues with Network Error Logging
Libor Polcák
,
Kamil Jerábek
.
secrypt 2023
:
683-690
[doi]
Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis
Arjun Prasad
,
Kevin Kanichery Biju
,
Soumya Somani
,
Barsha Mitra
.
secrypt 2023
:
335-344
Blockchain Data Replication
Roberto De Prisco
,
Sergiy Shevchenko
,
Pompeo Faruolo
.
secrypt 2023
:
746-751
[doi]
Anomaly Detection in Smart Grid Networks Using Power Consumption Data
Hasina Rahman
,
Priyadarsi Nanda
,
Manoranjan Mohanty
,
Nazim Uddin Sheikh
.
secrypt 2023
:
830-837
[doi]
PIUDI: Private Information Update for Distributed Infrastructure
Shubham Raj
,
Snehil Joshi
,
Kannan Srinathan
.
secrypt 2023
:
425-432
[doi]
BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports
Vincent Raulin
,
Pierre-François Gimenez
,
Yufei Han
,
Valérie Viet Triem Tong
.
secrypt 2023
:
417-424
[doi]
AIS Authentication Using Certificateless Cryptography
Axel Rousselot
,
Nora Cuppens
,
Samra Bouakkaz
.
secrypt 2023
:
49-61
[doi]
A Rand Index-Based Analysis of Consensus Protocols
Sangita Roy
,
Rudrapatna K. Shyamasundar
.
secrypt 2023
:
567-576
[doi]
Defeating MageCart Attacks in a NAISS Way
Catalin Rus
,
Dipti Kapoor Sarmah
,
Mohammed El-hajj 0001
.
secrypt 2023
:
691-697
[doi]
Fidelis: Verifiable Keyword Search with No Trust Assumption
Laltu Sardar
,
Subhra Mazumdar 0001
.
secrypt 2023
:
698-703
[doi]
Virtual Private Networks in the Quantum Era: A Security in Depth Approach
David Schatz
,
Friedrich Altheide
,
Hedwig Koerfgen
,
Michael Rossberg
,
Guenter Schaefer
.
secrypt 2023
:
486-494
[doi]
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware
David Schrammel
,
Salmin Sultana
,
Karanvir Grewal
,
Michael LeMay
,
David M. Durham
,
Martin Unterguggenberger
,
Pascal Nasahl
,
Stefan Mangard
.
secrypt 2023
:
25-36
[doi]
Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models
Janaka Senanayake
,
Harsha K. Kalutarage
,
M. Omar Al-Kadri
,
Luca Piras
,
Andrei Petrovski 0001
.
secrypt 2023
:
659-666
[doi]
SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme
Sehrish Shafeeq
,
Mathias Fischer 0001
.
secrypt 2023
:
369-376
[doi]
Receipt-Free Electronic Voting from zk-SNARK
Maryam Sheikhi
,
Rosario Giustolisi
,
Carsten Schürmann
.
secrypt 2023
:
254-266
Automated Feature Engineering for AutoML Using Genetic Algorithms
Kevin Shi
,
Sherif Saad
.
secrypt 2023
:
450-459
[doi]
ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract
Rudrapatna K. Shyamasundar
.
secrypt 2023
:
557-566
[doi]
5G Handover: When Forward Security Breaks
Navya Sivaraman
,
Simin Nadjm-Tehrani
.
secrypt 2023
:
503-510
[doi]
Lessons Learned: Defending Against Property Inference Attacks
Joshua Stock
,
Jens Wettlaufer
,
Daniel Demmler
,
Hannes Federrath
.
secrypt 2023
:
312-323
[doi]
A Note on a CBC-Type Mode of Operation
George Teseleanu
.
secrypt 2023
:
353-360
[doi]
Threshold Cryptosystems Based on 2^k-th Power Residue Symbols
George Teseleanu
.
secrypt 2023
:
295-302
[doi]
A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things
Syed Sajid Ullah
,
Vladimir A. Oleshchuk
,
Harsha S. Gardiyawasam Pussewalage
.
secrypt 2023
:
528-539
[doi]
A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment
Mofareh Waqdan
,
Habib Louafi
,
Malek Mouhoub
.
secrypt 2023
:
667-672
[doi]
The Certification Panacea
Rigo Wenning
.
secrypt 2023
:
5
WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers
Pascal Wichmann
,
Sam Ansari
,
Hannes Federrath
,
Jens Lindemann 0001
.
secrypt 2023
:
548-556
[doi]
Proctoring Online Exam Using Eye Tracking
Waheeb Yaqub
,
Manoranjan Mohanty
,
Basem Suleiman
.
secrypt 2023
:
738-745
[doi]
Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks
Rocco Zaccagnino
,
Antonio Cirillo
,
Alfonso Guarino
,
Nicola Lettieri
,
Delfina Malandrino
,
Gianluca Zaccagnino
.
secrypt 2023
:
394-401
[doi]
Sign in
or
sign up
to see more results.