Abstract is missing.
- Secure and Robust Cyber Security Threat Information SharingAnis Bkakria, Reda Yaich, Walid Arabi. 3-18 [doi]
- Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE EraAdda-Akram Bendoukha, Aymen Boudguiga, Renaud Sirdey. 19-33 [doi]
- Generic Construction for Identity-Based Proxy Blind SignatureXavier Bultel, Pascal Lafourcade 0001, Charles Olivier-Anclin, Léo Robert. 34-52 [doi]
- Optimizing Anonymity and Performance in a Mix NetworkMathieu Jee, Ania M. Piotrowska, Harry Halpin, Ninoslav Marina. 53-62 [doi]
- Homomorphic Evaluation of Lightweight Cipher Boolean CircuitsKalikinkar Mandal, Guang Gong. 63-74 [doi]
- Breaking Black Box Crypto-Devices Using Laser Fault InjectionBodo Selmke, Emanuele Strieder, Johann Heyszl, Sven Freud, Tobias Damm. 75-90 [doi]
- Employing Feature Selection to Improve the Performance of Intrusion Detection SystemsRicardo Ávila, Raphaël Khoury, Christophe Pere, Kobra Khanmohammadi. 93-112 [doi]
- Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer TransmissionYunjie Yi, Kalikinkar Mandal, Guang Gong. 113-129 [doi]
- HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPMDylan Paulin, Christine Hennebert, Thibault Franco-Rondisson, Romain Jayles, Thomas Loubier, Raphaël Collado. 130-145 [doi]
- Automatic Annotation of Confidential Data in Java CodeIulia Bastys, Pauline Bolignano, Franco Raimondi, Daniel Schoepe. 146-161 [doi]
- A Quantile-Based Watermarking Approach for Distortion MinimizationMaikel Lázaro Pérez Gort, Martina Olliaro, Agostino Cortesi. 162-176 [doi]
- EXMULF: An Explainable Multimodal Content-Based Fake News Detection SystemSabrine Amri, Dorsaf Sallami, Esma Aïmeur. 177-187 [doi]
- A Comparative Analysis of Machine Learning Techniques for IoT Intrusion DetectionJoão Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa, Eva Maia. 191-207 [doi]
- An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart ContractsMontassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent. 208-217 [doi]
- PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through BlockchainSigurd Frej Joel Jørgensen Ankergård, Edlira Dushku, Nicola Dragoni. 218-234 [doi]
- Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine. 235-252 [doi]
- Lightweight Authentication and Encryption for Online Monitoring in IIoT EnvironmentsArmando Miguel Garcia, Matthias Hiller. 253-262 [doi]
- Detecting Attacks in Network Traffic Using Normality Models: The Cellwise EstimatorFelix Heine, Carsten Kleiner, Philip Klostermeyer, Volker Ahlers, Tim Laue 0003, Nils Wellermann. 265-282 [doi]
- A Modular Runtime Enforcement Model Using Multi-tracesRania Taleb, Sylvain Hallé, Raphaël Khoury. 283-302 [doi]
- A Tight Integration of Symbolic Execution and Fuzzing (Short Paper)Yaëlle Vinçont, Sébastien Bardin, Michaël Marcozzi. 303-310 [doi]
- At the Bottom of Binary Analysis: InstructionsGuillaume Bonfante, Alexandre Talon. 311-320 [doi]
- $\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android ApplicationsMarwa Ziadia, Mohamed Mejri, Jaouhar Fattahi. 321-337 [doi]
- Why Anomaly-Based Intrusion Detection Systems Have Not Yet Conquered the Industrial Market?S. Seng, Joaquín García-Alfaro, Youssef Laarouchi. 341-354 [doi]
- Creation and Detection of German Voice DeepfakesVanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, Andreas Schaad, Felix Schmieder. 355-364 [doi]
- Asset Sensitivity for Aligning Risk Assessment Across Multiple Units in Complex OrganizationsCarla Mascia, Silvio Ranise. 365-375 [doi]
- An Extensive Comparison of Systems for Entity Extraction from Log FilesAnubhav Chhabra, Paula Branco, Guy-Vincent Jourdan, Herna L. Viktor. 376-392 [doi]
- Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit ApproachHazel Murray, David Malone. 393-413 [doi]