default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 388 matches
- 2024
- Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh, Tansu Alpcan:
A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. IWSEC 2024: 244-254 - Anushree Belel, Ratna Dutta:
Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing. IWSEC 2024: 101-121 - Alexander Bille, Elmar Tischhauser:
Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems. IWSEC 2024: 23-42 - Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui:
Few Edges are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. IWSEC 2024: 257-276 - Jaiden Fairoze, Peitong Duan:
Information Leakage Through Packet Lengths in RTC Traffic. IWSEC 2024: 277-296 - Yoshiaki Honda, Kazumasa Shinagawa:
Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening. IWSEC 2024: 85-100 - Vincent Hwang:
Formal Verification of Emulated Floating-Point Arithmetic in Falcon. IWSEC 2024: 125-141 - Eik List:
Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES. IWSEC 2024: 45-64 - Arash Mahboubi, Seyit Camtepe, Keyvan Ansari, Marcin Piotr Pawlowski, Pawel Morawiecki, Jaroslaw Duda, Josef Pieprzyk:
File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. IWSEC 2024: 213-233 - Rin Miyachi, Konan Nagashima, Taiichi Saito:
Race Condition Vulnerabilities in WordPress Plug-ins. IWSEC 2024: 179-194 - Kabuto Okajima, Koji Chida:
A Study on Anonymization Through Participation in iPWS Cup 2023. IWSEC 2024: 297-306 - Arata Sato, Aurélien Auzemery, Akira Katayama, Masaya Yasuda:
Experimental Analysis of Integer Factorization Methods Using Lattices. IWSEC 2024: 142-157 - Takuro Shiraya, Kosei Sakamoto, Takanori Isobe:
Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes. IWSEC 2024: 3-22 - Dario Stabili, Tobia Bocchi, Filip Valgimigli, Mirco Marchetti:
Finding (and Exploiting) Vulnerabilities on IP Cameras: The Tenda CP3 Case Study. IWSEC 2024: 195-210 - Nobuyuki Sugio, Hokuto Ito:
Implementation for Malicious Software Using ChatGPT-4. IWSEC 2024: 234-243 - Bungo Taga, Norimitsu Ito, Takako Okano:
Weak Keys of the Full MISTY1 Recovered in Practical Time. IWSEC 2024: 65-81 - Naoki Yoshiguchi, Yusuke Aikawa, Tsuyoshi Takagi:
Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. IWSEC 2024: 158-176 - Kazuhiko Minematsu, Mamoru Mimura:
Advances in Information and Computer Security - 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings. Lecture Notes in Computer Science 14977, Springer 2024, ISBN 978-981-97-7736-5 [contents] - 2023
- Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphael R. Toledo:
aPlonK: Aggregated PlonK from Multi-polynomial Commitment Schemes. IWSEC 2023: 195-213 - Julien Béguinot, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul, Ville Yli-Mäyry:
Reliability of Ring Oscillator PUFs with Reduced Helper Data. IWSEC 2023: 36-56 - Max Cartor, Ryann Cartor, Mark Lewis, Daniel Smith-Tone:
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials. IWSEC 2023: 137-151 - Hiroki Furue, Yasuhiko Ikematsu:
A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack. IWSEC 2023: 101-116 - Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata:
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. IWSEC 2023: 77-97 - Vincent Giraud, David Naccache:
Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges. IWSEC 2023: 3-15 - Samuel D. Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, Léo Robert:
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun. IWSEC 2023: 255-272 - Hyeonbum Lee, Jae Hong Seo:
TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup. IWSEC 2023: 214-234 - Laurane Marco, Abdullah Talayhan, Serge Vaudenay:
Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger. IWSEC 2023: 173-192 - Koji Nuida:
Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding. IWSEC 2023: 237-254 - Riccardo Remigio, Alessandro Bertani, Mario Polino, Michele Carminati, Stefano Zanero:
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis. IWSEC 2023: 16-35 - Bénédikt Tran, Serge Vaudenay:
Extractable Witness Encryption for the Homogeneous Linear Equations Problem. IWSEC 2023: 152-172
skipping 358 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-19 19:17 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint