


default search action
14th SPACE 2024: Kottayam, India
- Johann Knechtel, Urbi Chatterjee, Domenic Forte:

Security, Privacy, and Applied Cryptography Engineering - 14th International Conference, SPACE 2024, Kottayam, India, December 14-17, 2024, Proceedings. Lecture Notes in Computer Science 15351, Springer 2025, ISBN 978-3-031-80407-6 - Navajit Singh Baban, Prithwish Basu Roy, Pauline John, Azhar Zam, Sukanta Bhattacharjee, Yong-Ak Song, Ramesh Karri, Krishnendu Chakrabarty:

Attacks and Countermeasures for Digital Microfluidic Biochips - Extended Abstract. 1-5 - Issa Baddour

, Dip Sankar Banerjee
, Somitra Kumar Sanadhya
:
SideLink: Exposing NVLink to Covert and Side-Channel Attacks Official Work-in-Progress Paper. 6-15 - Subhadeep Banik, Francesco Regazzoni:

Faster and More Energy-Efficient Equation Solvers over GF(2). 16-39 - Reeshav Chowdhury, Aman Kumar, Vaibhav Dashrath Mohite, Ayantika Chatterjee:

Transferability of Evasion Attacks Against FHE Encrypted Inference - Official Work-in-Progress Paper. 40-68 - Madhurima Das, Bodhisatwa Mazumdar:

Security Analysis of ASCON Cipher Under Persistent Faults - Official Work-in-Progress Paper. 69-79 - Fabrianne Effendi, Anupam Chattopadhyay

:
Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-money Laundering. 80-105 - Saltanat Firdous, Asutosh Brahma, Arjun Menon, Chester Rebeiro:

CoPrIME: Complete Process Isolation Using Memory Encryption - Extended Abstract. 106-109 - David Johnston

:
Online Testing Entropy and Entropy Tests with a Two State Markov Model - Invited Paper. 110-128 - K. M. Sameera, M. Abhinav, P. P. Amal

, T. Babu Abhiram, Raj K. Abishek
, Tomichen Amal, P. Anaina, P. Vinod
, Rafidha Rehiman K. A.
, Mauro Conti
:
DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated Learning. 129-148 - Rupesh Raj Karn, Ozgur Sinanoglu:

Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques. 149-174 - Jonna Likith Sai

, Souptik Majumder
, Rohit Verma
, Priyanka Bagade
:
NID-TGN: Spatiotemporal Intrusion Detection System for IoT Networks. 175-195 - Samyuktha M, Pallavi Borkar, Chester Rebeiro:

High Speed High Assurance Implementations of Multivariate Quadratic Based Signatures - Extended Abstract. 196-200 - Upasana Mandal

, Rupali Kalundia
, Nimish Mishra
, Shubhi Shukla
, Sarani Bhattacharya
, Debdeep Mukhopadhyay
:
"There's Always Another Counter": Detecting Micro-Architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting. 201-220 - Rohith George Ninan

, S. Kala
:
FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels - Extended Abstract. 221-224 - Sikhar Patranabis

:
Post-quantum Multi-client Conjunctive Searchable Symmetric Encryption from Isogenies. 225-257 - Yi Hao Puah, Tu Anh Ngo

, Nandish Chattopadhyay, Anupam Chattopadhyay:
BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks - Official Work-in-Progress Paper. 258-276 - Ashish Vishwakarma, Umesh Kashyap, Sk Subidh Ali:

Adversarial Malware Detection - Official Work-in-Progress Paper. 277-286 - Tarun Yadav

, Manoj Kumar
:
ML Based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON. 287-316

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














