default search action
22nd ACNS 2024: Abu Dhabi, UAE - Part III
- Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14585, Springer 2024, ISBN 978-3-031-54775-1
Blockchain
- Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. 3-27 - Siavash Riahi, Orfeas Stefanos Thyfronitis Litos:
Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor Signatures. 28-50 - Ranjit Kumaresan, Duc Viet Le, Mohsen Minaei, Srinivasan Raghuraman, Yibin Yang, Mahdi Zamani:
Programmable Payment Channels. 51-73 - Sepideh Avizheh, Reihaneh Safavi-Naini:
Fair Private Set Intersection Using Smart Contracts. 74-104 - Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. 105-134
Smart Infrastructures, Systems and Software
- Adrian Kailus, Dustin Kern, Christoph Krauß:
Self-sovereign Identity for Electric Vehicle Charging. 137-162 - Soumyadyuti Ghosh, Manaar Alam, Soumyajit Dey, Debdeep Mukhopadhyay:
"Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure. 163-189 - Nico Heitmann, Hendrik Siewert, Sven Moog, Juraj Somorovsky:
Security Analysis of BigBlueButton and eduMEET. 190-216 - Naiqian Zhang, Zheyun Feng, Dongpeng Xu:
An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation. 217-240 - Kunal Mukherjee, Joshua Wiedemeier, Qi Wang, Junpei Kamimura, Junghwan John Rhee, James Wei, Zhichun Li, Xiao Yu, Lu-An Tang, Jiaping Gui, Kangkook Jee:
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security. 241-268
Attacks
- Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede:
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer. 271-300 - Ruize Wang, Martin Brisfors, Elena Dubrova:
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation. 301-324 - Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions. 325-354 - Yunxue Lin, Ling Sun:
Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48. 355-377
Users and Usability
- Daniel Köhler, Wenzel Pünter, Christoph Meinel:
How Users Investigate Phishing Emails that Lack Traditional Phishing Cues. 381-411 - H. T. M. A. Riyadh, Divyanshu Bhardwaj, Adrian Dabrowski, Katharina Krombholz:
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures. 412-431 - Xianbo Wang, Kaixuan Luo, Wing Cheong Lau:
Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps. 432-459
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.