Abstract is missing.
- Privacy-Preserving Analytics in the Big Data EnvironmentJaideep Vaidya. 5
- VEST: An Early Warning System for Future Cyber-AttacksV. S. Subrahmanian. 7
- Access Control Convergence: Challenges and OpportunitiesRavi S. Sandhu. 9
- An Upcycling Tokenization Method for Credit Card NumbersCyrius Nugier, Diane Leblanc-Albarel, Agathe Blaise, Simon Masson, Paul Huynh, Yris Brice Wandji Piugie. 15-25 [doi]
- A Unified Model to Detect Information Flow and Access Control Violations in Software ArchitecturesStephan Seifermann, Robert Heinrich, Dominik Werle, Ralf H. Reussner. 26-37 [doi]
- Can a TLS Certificate Be Phishy?Kaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen. 38-49 [doi]
- Comparing Classifiers' Performance under Differential PrivacyMilan Lopuhaä-Zwakenberg, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone. 50-61 [doi]
- Hashing to Prime in Zero-KnowledgeThomas Groß. 62-74 [doi]
- BLT+L: Efficient Signatures from Timestamping and EndorsementsDenis Firsov, Henri Lakk, Sven Laur, Ahto Truu. 75-86 [doi]
- Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information LossFlorian Thaeter, Rüdiger Reischuk. 87-98 [doi]
- Statically Identifying XSS using Deep LearningHeloise Maurel, Santiago Vidal, Tamara Rezk. 99-110 [doi]
- Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control SystemsMuhammad I. H. Sukmana, Kai-Oliver Kohlen, Carl Gödecken, Pascal Schulze, Christoph Meinel. 111-124 [doi]
- Python and Malware: Developing Stealth and Evasive Malware without ObfuscationVasilios Koutsokostas, Constantinos Patsakis. 125-136 [doi]
- SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of AssuranceAndreas Abraham, Christopher Schinnerl, Stefan More. 137-148 [doi]
- Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party ComputationFelix Hörandner, Bernd Prünster. 149-160 [doi]
- Towards Integrating Security in Industrial Engineering Design PracticesPanagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis. 161-172 [doi]
- Balancing Quality and Efficiency in Private Clustering with Affinity PropagationHannah Keller, Helen Möllering, Thomas Schneider 0003, Hossein Yalame. 173-184 [doi]
- Automated Symbolic Verification of Telegram's MTProto 2.0Marino Miculan, Nicola Vitacolonna. 185-197 [doi]
- Formal Proof of a Vulnerability in Z-Wave IoT ProtocolMario Lilli, Chiara Braghin, Elvinia Riccobene. 198-209 [doi]
- Formal Analysis of EDHOC Key Establishment for Constrained IoT DevicesKarl Norrman, Vaishnavi Sundararajan, Alessandro Bruni. 210-221 [doi]
- A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocumentsMarco Pernpruner, Giada Sciarretta, Silvio Ranise. 222-233 [doi]
- The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic AnalysisMarius Schlegel, Peter Amthor 0001. 234-246 [doi]
- Program Protection through Software-based Hardware AbstractionJeffrey Todd McDonald, Ramya Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel. 247-258 [doi]
- Vulnerability Metrics for Graph-based Configuration SecurityIbifubara Iganibo, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito. 259-270 [doi]
- Model Inversion for Impersonation in Behavioral Authentication SystemsMd. Morshedul Islam, Reihaneh Safavi-Naini. 271-282 [doi]
- Trace Recovery: Inferring Fine-grained Trace of Energy Data from AggregatesNazim Uddin Sheikh, Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar. 283-294 [doi]
- Preventing Watermark Forging Attacks in a MLaaS EnvironmentSofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi. 295-306 [doi]
- Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving Micro-data Publishing and AnalysisNavoda Senavirathne, Vicenç Torra. 307-320 [doi]
- Boolean Exponent SplittingMichael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos. 321-332 [doi]
- Proof-of-Forgery for Hash-based SignaturesEvgeniy O. Kiktenko, Mikhail A. Kudinov, Andrey A. Bulychev, Aleksey K. Fedorov. 333-342 [doi]
- Trusted Enforcement of Application-specific Security PoliciesMarius Schlegel. 343-355 [doi]
- Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for AndroidJennifer Bellizzi, Mark Vella, Christian Colombo 0001, Julio Hernandez-Castro. 356-369 [doi]
- Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental AssessmentStefano Berlato, Roberto Carbone, Silvio Ranise. 370-381 [doi]
- Supporting Cyber Threat Analysis with Service-Oriented Enterprise ModelingKees Leune, Sung Kim. 385-394 [doi]
- Signer and Message Ambiguity from a Variety of KeysGeorge Teseleanu. 395-402 [doi]
- Ransomware Detection using Markov Chain Models over File HeadersNicolas Bailluet, Hélène Le Bouder, David Lubicz. 403-411 [doi]
- Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-WorkEfe Ulas Akay Seyitoglu, Attila Altay Yavuz, Thang Hoang. 412-419 [doi]
- A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCEMurat Burhan Ilter, Ali Aydin Selçuk. 420-427 [doi]
- Protecting End User's Privacy When using Social Login through GDPR ComplianceCarlos Villarán, Marta Beltrán. 428-435 [doi]
- Efficient Joint Random Number Generation for Secure Multi-party ComputationErwin Hoogerwerf, Daphne van Tetering, Aslí Bay, Zekeriya Erkin. 436-443 [doi]
- Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate RepresentationDaniel Demmler, Stefan Katzenbeisser 0001, Thomas Schneider 0003, Tom Schuster, Christian Weinert. 444-451 [doi]
- A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game FormulationBasant Subba, Ayushi Singh. 452-459 [doi]
- An Extension of the Avalanche Criterion in the Context of c-DifferentialsPål Ellingsen, Constanza Riera, Pantelimon Stanica, Anton Tkachenko. 460-467 [doi]
- A New Delegated Authentication Protocol based on PREAnass Sbai, Cyril Drocourt, Gilles Dequen. 468-478 [doi]
- Mobile Family Detection through Audio Signals ClassificationRosangela Casolare, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 479-486 [doi]
- Accurate Measurement of the Energy Consumption of Security FunctionsBenoît Fournier, Valérie Viet Triem Tong, Gilles Guette. 487-494 [doi]
- Practically Efficient RFID Scheme with Constant-time IdentificationFerucio Laurentiu Tiplea, Cristian Hristea. 495-506 [doi]
- A Comparison of GKE Protocols based on SIDHHiroki Okada, Shinsaku Kiyomoto, Carlos Cid. 507-514 [doi]
- Multi-Party Private Set Intersection Protocols for Practical ApplicationsAsli Bay, Zeki Erkin, Mina Alishahi, Jelle Vos. 515-522 [doi]
- Using Program Analysis to Identify the Use of Vulnerable FunctionsRasmus Hagberg, Martin Hell, Christoph Reichenbach. 523-530 [doi]
- Compact Variable-base ECC Scalar Multiplication using Euclidean Addition ChainsFabien Herbaut, Nicolas Meloni, Pascal Véron. 531-539 [doi]
- Secure Computation by Secret Sharing using Input Encrypted with Random NumberKeiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal. 540-547 [doi]
- A Scalable Bitcoin-based Public Key Certificate Management SystemChloe Tartan, Craig Wright, Michaella Pettit, Wei Zhang. 548-559 [doi]
- Cloud Key Management using Trusted Execution EnvironmentJaouhara Bouamama, Mustapha Hedabou, Mohammed Erradi. 560-567 [doi]
- An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning AlgorithmsGustavo Gonzalez Granadillo, Alejandro G. Bedoya, Rodrigo Diaz. 568-575 [doi]
- Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical ApproachMarcin Gregorczyk, Wojciech Mazurczyk. 576-586 [doi]
- SecSDN: A Novel Architecture for a Secure SDNParjanya Vyas, R. K. Shyamasundar. 587-594 [doi]
- Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials ProblemRatna Dutta, Sumit Kumar Debnath, Chinmoy Biswas. 595-602 [doi]
- Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACSNils Mäurer, Christoph Gentsch, Thomas Gräupl, Corinna Schmitt. 603-610 [doi]
- Side Channel Counter-measures based on Randomized AMNS Modular MultiplicationChristophe Nègre. 611-619 [doi]
- Selective Owner-side Encryption in Digital Data Markets: Strategies for Key DerivationSara Foresti, Giovanni Livraga. 620-627 [doi]
- Security Issues of Electronic and Mobile BankingWojciech Wodo, Damian Stygar, Przemyslaw Blaskiewicz. 631-638 [doi]
- Enforcing Cardinality Constraint in Temporal RBACSohail Rajdev, Barsha Mitra. 639-646 [doi]
- Dynamic Access Control Framework for Enterprise Content Management SystemsNadia Hocine, Ismail Bokhari. 647-652 [doi]
- AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve MethodPritam Pallab, Abhijit Das. 653-658 [doi]
- Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHACJulius Hekkala, Sara Nikula, Outi-Marja Latvala, Kimmo Halunen. 659-664 [doi]
- Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google PlayI Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky. 665-673 [doi]
- BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via BlockchainI Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar. 674-679 [doi]
- Private Set Intersection: Past, Present and FutureIonita Andreea. 680-685 [doi]
- MMU-based Access Control for LibrariesMarinos Tsantekidis, Vassilis Prevelakis. 686-691 [doi]
- Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing AttackKaito Uemura, Satoshi Obana. 692-697 [doi]
- PUF based Lightweight Authentication and Key Exchange Protocol for IoTSourav Roy, Dipnarayan Das, Anindan Mondal, Mahabub Hasan Mahalat, Suchismita Roy, Bibhash Sen. 698-703 [doi]
- On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-ServiceAnne V. D. M. Kayem, Nikolai J. Podlesny, Christoph Meinel, Anja Lehmann. 704-714 [doi]
- Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model's ComplexityMathias P. M. Parisot, Balázs Pejó, Dayana Spagnuelo. 715-721 [doi]
- RMCCS: RSSI-based Message Consistency Checking Scheme for V2V CommunicationsMujahid Muhammad, Paul Kearney, Adel Aneiba, Junaid Arshad, Andreas Kunz. 722-727 [doi]
- A New Method of Testing Machine Learning Models of Detection for Targeted DDoS AttacksMateusz Kozlowski, Bogdan Ksiezopolski. 728-733 [doi]
- Comparing Support Vector Machine and Neural Network Classifiers of CVE VulnerabilitiesGrzegorz J. Blinowski, Pawel Piotrowski, Michal Wisniewski. 734-740 [doi]
- Privacy Aura for Transparent Authentication on Multiple Smart DevicesTakoua Guiga, Jean-Jacques Schwartzmann, Christophe Rosenberger. 741-746 [doi]
- Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke DynamicsDenis Migdal, Ilaria Magotti, Christophe Rosenberger. 747-753 [doi]
- Fair Mutual AuthenticationJacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski. 754-759 [doi]
- Towards CRYSTALS-Kyber VHDL ImplementationSara Ricci, Petr Jedlicka, Peter Cíbik, Petr Dzurenda, Lukas Malina, Jan Hajny. 760-765 [doi]
- Fast Cramer-Shoup CryptosystemPascal Lafourcade 0001, Léo Robert, Demba Sow. 766-771 [doi]
- RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle NetworkYosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, Ghaleb Hoblos, Leïla Azouz Saïdane. 772-778 [doi]
- Verify It Yourself: A Note on Activation Functions' Influence on Fast DeepFake DetectionPiotr Kawa, Piotr Syga. 779-784 [doi]
- GRANEF: Utilization of a Graph Database for Network ForensicsMilan Cermák, Denisa Sramkova. 785-790 [doi]
- Anonymous Attribute-based Credentials in Collaborative Indoor Positioning SystemsRaul Casanova Marques, Pavel Pascacio, Jan Hajny, Joaquín Torres-Sospedra. 791-797 [doi]
- HIJaX: Human Intent JavaScript XSS GeneratorYaw Frempong, Yates Snyder, Erfan Al-Hossami, Meera Sridhar, Samira Shaikh. 798-805 [doi]
- User Identification from Time Series of Fitness DataThomas Marchioro, Andrei Kazlouski, Evangelos P. Markatos. 806-811 [doi]
- Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-ThingsHiral S. Trivedi, Sankita J. Patel. 812-818 [doi]
- C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic EnvironmentsMitsuhiro Mabuchi, Koji Hasebe. 819-826 [doi]
- Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment?Salimeh Dashti, Anderson Santana de Oliveria, Caelin Kaplan, Manuel Dalcastagné, Silvio Ranise. 827-832 [doi]
- Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434Christophe Ponsard, Valéry Ramon, Jean-Christophe Deprez. 833-838 [doi]
- Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp)Wisnu Uriawan, Omar Hasan, Youakim Badr, Lionel Brunie. 839-844 [doi]
- Investing Data with Untrusted Parties using HEMark Dockendorf, Ram Dantu, Kirill Morozov, Sanjukta Bhowmick. 845-853 [doi]
- Machine Learning Classification of Obfuscation using Image VisualizationColby Parker, Jeffrey Todd McDonald, Dimitrios Damopoulos. 854-859 [doi]