Abstract is missing.
- Integer LWE with Non-subgaussian Error and Related AttacksTianyu Wang, Yuejun Liu, Jun Xu, Lei Hu, Yang Tao, Yongbin Zhou. 3-25 [doi]
- Layering Quantum-Resistance into Classical Digital Signature AlgorithmsTeik Guan Tan, Jianying Zhou 0001. 26-41 [doi]
- Cryptanalysis of RSA Variants with Primes Sharing Most Significant BitsMeryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien. 42-53 [doi]
- Cryptanalysis of Two White-Box Implementations of the SM4 Block CipherJiqiang Lu, Jingyu Li. 54-69 [doi]
- A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic DataSara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld, Raj Gaire 0001, Shangqi Lai. 70-94 [doi]
- Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoTBowen Liu, Qiang Tang 0001, Jianying Zhou. 95-116 [doi]
- Randomized Component Based Secure Secret Reconstruction in Insecure NetworksXinyan Wang, Fuyou Miao. 117-138 [doi]
- Transparency Order of (n, m)-Functions - Its Further Characterization and ApplicationsYu Zhou 0012, Yongzhuang Wei, Hailong Zhang 0001, Luyang Li, Enes Pasalic, Wenling Wu. 139-157 [doi]
- Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web PrivacySeyed Ali Akhavani, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu. 161-176 [doi]
- TridentShell: a Covert and Scalable Backdoor Injection Attack on Web ApplicationsXiaobo Yu, Weizhi Meng 0001, Lei Zhao, Yining Liu. 177-194 [doi]
- Andromeda: Enabling Secure Enclaves for the Android EcosystemDimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis. 195-217 [doi]
- FEX - A Feature Extractor for Real-Time IDSAndreas Schaad, Dominik Binder. 221-237 [doi]
- Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning ClassificationRikima Mitsuhashi, Akihiro Satoh, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai. 238-256 [doi]
- Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network TrafficMohammad Reza Norouzian, Peng Xu, Claudia Eckert 0001, Apostolis Zarras. 259-278 [doi]
- A Novel Behavioural Screenlogger Detection SystemHugo Sbai, Jassim Happa, Michael Goldsmith. 279-295 [doi]
- sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving LearningGeorgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa. 296-319 [doi]
- DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-Architecture Firmware Vulnerability DetectionHao Sun, Yanjun Tong, Jing Zhao, Zhaoquan Gu. 320-337 [doi]
- Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial NetworksShichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang 0038, Weiqiang Liu. 341-357 [doi]
- Targeted Universal Adversarial Perturbations for Automatic Speech RecognitionWei Zong, Yang-Wai Chow, Willy Susilo, Santu Rana, Svetha Venkatesh. 358-373 [doi]
- Voxstructor: Voice Reconstruction from VoiceprintPanpan Lu, Qi Li, Hui Zhu 0001, Giuliano Sovernigo, Xiaodong Lin. 374-397 [doi]
- Word-Map: Using Community Detection Algorithm to Detect AGDsFutai Zou, Qianying Shen, Yuzong Hu. 398-414 [doi]