default search action
18th ISPEC 2023: Copenhagen, Denmark
- Weizhi Meng, Zheng Yan, Vincenzo Piuri:
Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings. Lecture Notes in Computer Science 14341, Springer 2023, ISBN 978-981-99-7031-5 - Samaneh Mohammadi, Sima Sinaei, Ali Balador, Francesco Flammini:
Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition. 1-16 - Tran Duc Luong, Vuong Minh Tien, Phan The Duy, Van-Hau Pham:
FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations. 17-35 - Ahmed E. Samy, Sarunas Girdzijauskas:
Mitigating Sybil Attacks in Federated Learning. 36-51 - Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. 52-73 - Sebastian Simon, Cezara Petrui, Carlos Pinzón, Catuscia Palamidessi:
Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy. 74-90 - Na Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang:
Cross-Border Data Security from the Perspective of Risk Assessment. 91-104 - Yohei Watanabe, Naoto Yanai, Junji Shikata:
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures. 105-122 - Jia Zhao, Xinyu Rao, JiQiang Liu, Yue Guo, BoKai Yang:
CVAR-FL IoV Intrusion Detection Framework. 123-137 - Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning:
Transparent Security Method for Automating IoT Security Assessments. 138-153 - Kwan Yin Chan, Handong Cui, Tsz Hon Yuen:
DIDO: Data Provenance from Restricted TLS 1.3 Websites. 154-169 - Mahdieh Safarzadehvahed, Farzaneh Abazari, Fateme Shabani:
QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing. 170-193 - Rabeya Basri, Gour C. Karmakar, Joarder Kamruzzaman, S. H. Shah Newaz, Linh V. Nguyen, Muhammad Usman:
Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G. 194-208 - P. Mohan Anand, P. V. Sai Charan, Hrushikesh Chunduri, Sandeep K. Shukla:
RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files. 209-229 - Bikash Saha, Nanda Rani, Sandeep Kumar Shukla:
MalXCap: A Method for Malware Capability Extraction. 230-249 - Ying Li, Yuhao Lin, Yongchao Zhong, Qiuling Yue, Jinglu Hu, Wenjie Wang, Huiyang Shi, Yuqing Zhang:
Multimodal Software Defect Severity Prediction Based on Sentiment Probability. 250-265 - Guanghui Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao:
Recovering Multi-prime RSA Keys with Erasures and Errors. 266-283 - Thomas Prantl, Simon Engel, Lukas Horn, Dennis Kaiser, Lukas Iffländer, André Bauer, Christian Krupitzer, Samuel Kounev:
Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example. 284-298 - Sohto Chiku, Keisuke Hara, Junji Shikata:
Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities. 299-314 - Chao Liu, Bozhong Liu:
A New Gadget Decomposition Algorithm with Less Noise Growth in HE Schemes. 315-331 - Tomoya Morooka, Yoshifumi Manabe, Kazumasa Shinagawa:
Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations. 332-346 - Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj:
Cryptanalysis of Human Identification Protocol with Human-Computable Passwords. 347-364 - Hannes Salin, Lukasz Krzywiecki:
A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS). 365-379 - Yuchen Yin, Qingqing Gan, Cong Zuo, Ning Liu, Changji Wang, Yuning Jiang:
A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability. 380-398 - Philipp Jakubeit, Andreas Peter, Maarten van Steen:
LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity. 399-418 - Yalan Wang, Liqun Chen, Long Meng, Yangguang Tian:
BAHS: A Blockchain-Aided Hash-Based Signature Scheme. 419-439 - Mingming Wang, Qianhong Wu:
Lever: Making Intensive Validation Practical on Blockchain. 440-461 - Andrés Gómez Ramirez, Loui Al Sardy, Francis Gomez Ramirez:
Tikuna: An Ethereum Blockchain Network Security Monitoring System. 462-476 - Mathieu de Goyon, Atsuko Miyaji:
Isogeny-Based Multi-signature Scheme. 477-491 - Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury:
Security Analysis of WAGE Against Division Property Based Cube Attack. 492-506 - Li Liu, Puwen Wei:
When MPC in the Head Meets VC. 507-526 - Sergejs Kozlovics, Krisjanis Petrucena, Davis Larins, Juris Viksna:
Quantum Key Distribution as a Service and Its Injection into TLS. 527-545 - Ngo Duc Hoang Son, Huynh Thai Thi, Phan The Duy, Van-Hau Pham:
XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph. 546-561 - Yuki Nakagawa, Mamoru Mimura:
XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs. 562-578 - Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning. 579-594 - Ajay Chandra Korlapati, Sanjeet Kumar Nayak, Partha Sarathi Chakraborty, Somanath Tripathy:
SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain. 595-613
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.