- Adrian Kailus, Dustin Kern, Christoph Krauß:
Self-sovereign Identity for Electric Vehicle Charging. ACNS (3) 2024: 137-162 - Daniel Köhler, Wenzel Pünter, Christoph Meinel:
How Users Investigate Phishing Emails that Lack Traditional Phishing Cues. ACNS (3) 2024: 381-411 - Ranjit Kumaresan, Duc Viet Le, Mohsen Minaei, Srinivasan Raghuraman, Yibin Yang, Mahdi Zamani:
Programmable Payment Channels. ACNS (3) 2024: 51-73 - Hyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh:
A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation. ACNS (2) 2024: 403-430 - Edoardo Liberati, Alessandro Visintin, Riccardo Lazzeretti, Mauro Conti, A. Selcuk Uluagac:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. ACNS (1) 2024: 183-210 - Yunxue Lin, Ling Sun:
Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48. ACNS (3) 2024: 355-377 - Xi Ling, Jiongchi Yu, Ziming Zhao, Zhihao Zhou, Haitao Xu, Binbin Chen, Fan Zhang:
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining. ACNS (2) 2024: 283-309 - Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. ACNS (3) 2024: 3-27 - Tianbo Lu, Xia Ding, Jiaze Shang, Pengfei Zhao, Han Zhang:
DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks. ACNS (2) 2024: 265-282 - Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede:
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer. ACNS (3) 2024: 271-300 - Kunal Mukherjee, Joshua Wiedemeier, Qi Wang, Junpei Kamimura, Junghwan John Rhee, James Wei, Zhichun Li, Xiao Yu, Lu-An Tang, Jiaping Gui, Kangkook Jee:
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security. ACNS (3) 2024: 241-268 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More. ACNS (1) 2024: 318-347 - Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. ACNS (3) 2024: 105-134 - Kittiphop Phalakarn, Toru Nakamura:
Verification Protocol for Stable Matching from Conditional Disclosure of Secrets. ACNS (1) 2024: 119-134 - Robert Podschwadt, Parsa Ghazvinian, Mohammad GhasemiGol, Daniel Takabi:
Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption. ACNS (2) 2024: 313-339 - H. T. M. A. Riyadh, Divyanshu Bhardwaj, Adrian Dabrowski, Katharina Krombholz:
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures. ACNS (3) 2024: 412-431 - Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:
Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World. ACNS (2) 2024: 47-78 - Ren Taguchi, Atsushi Takayasu:
On the Untapped Potential of the Quantum FLT-Based Inversion. ACNS (2) 2024: 79-100 - Mathy Vanhoef, Jeroen Robben:
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks. ACNS (2) 2024: 217-240 - Ruize Wang, Martin Brisfors, Elena Dubrova:
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation. ACNS (3) 2024: 301-324 - Xianbo Wang, Kaixuan Luo, Wing Cheong Lau:
Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps. ACNS (3) 2024: 432-459 - Pengfei Wang, Xiangyu Su, Mario Larangeira, Keisuke Tanaka:
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing. ACNS (1) 2024: 88-118 - Naiqian Zhang, Zheyun Feng, Dongpeng Xu:
An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation. ACNS (3) 2024: 217-240 - Mengyu Zhang, Long Wang, Xiaoping Zhang, Zhuotao Liu, Yisong Wang, Han Bao:
Efficient Clustering on Encrypted Data. ACNS (1) 2024: 213-236 - Bardia Babaei, Dirk Koch:
Analysis of Process Variation Within Clock Regions of AMD-Xilinx UltraScale+ Devices. ARC 2024: 193-209 - Allen Boston, Roman Gauchi, Pierre-Emmanuel Gaillardon:
Secure eFPGA Configuration: A System-Level Approach. ARC 2024: 151-165 - An Braeken, Bruno da Silva, Laurent Segers, Johannes Knödtel, Marc Reichenbach, Cornelia Wulf, Sergio A. Pertuz, Diana Göhringer, Jo Vliegen, Md Masoom Rabbani, Nele Mentens:
Trusted Computing Architectures for IoT Devices. ARC 2024: 241-254 - Henrique B. Brum, Mário P. Véstias, Horácio C. Neto:
LiDAR 3D Object Detection in FPGA with Low Bitwidth Quantization. ARC 2024: 90-105 - Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem:
Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach. ARC 2024: 48-62