


default search action
22nd ACNS 2024: Abu Dhabi, United Arab Emirates - Workshops Part II
- Martin Andreoni:

Applied Cryptography and Network Security Workshops - ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14587, Springer 2024, ISBN 978-3-031-61488-0
AAC - Workshop on Advances in Asymmetric Cryptanalysis
- Lorenz Panny:

Forging Tropical Signatures. 3-7 - Simone Perriello

, Alessandro Barenghi
, Gerardo Pelosi
:
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding. 8-28 - Kévin Carrier, Valérian Hatey, Jean-Pierre Tillich:

Projective Space Stern Decoding and Application to SDitH. 29-52
SiMLA - Security in Machine Learning and its Applications
- Alessandro Brighente

, Mauro Conti
, Sitora Salaeva
, Federico Turrin
:
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection. 55-74 - Kota Yoshida, Takeshi Fujino:

Model Extraction Attack Without Natural Images. 75-83 - Amirhossein Ebrahimi Moghaddam, Buvana Ganesh

, Paolo Palmieri:
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms. 84-100 - Ruilin Wang, Chuadhry Mujeeb Ahmed:

Differential Privacy with Selected Privacy Budget ε in a Cyber Physical System Using Machine Learning. 101-116
LEE - Low-Latency Encryption
- Zheng Zhao, Qun Liu, Yanhong Fan, Meiqin Wang:

Construction of 4 ˟ 4 Lightweight Low-Latency Involutory MDS Matrices. 119-140
CIMSS - Critical Infrastructure and Manufacturing System Security
- Meixuan Li

, Awais Yousaf
, Mark Goh
, Jianying Zhou
, Sudipta Chattopadhyay
:
Guidelines for Cyber Risk Management in Autonomous Shipping. 143-161 - Apurva K. Vangujar

, Alia Umrani
, Paolo Palmieri
:
Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs. 162-179
Posters
- Kamil Kaczynski

, Michal Glet
:
One Time Chat - A Toy End-to-End Encrypted Web Messaging Service. 183-187 - K. C. Lalropuia

, Sanjeev Goyal
, Borja Garcia de Soto
:
Game Theoretic Modeling of Insider Threats in an Organization. 188-192 - Rajesh Nayak

, C. D. Jaidhar:
Smart Appliance Abnormal Electrical Power Consumption Detection. 193-197 - Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, Robert H. Schmitt:

Towards Secure 5G Infrastructures for Production Systems. 198-203 - Daniel Köhler

, Michael Büßemeyer, Christoph Meinel:
Cybersecurity Awareness Education: Just as Useful for Technical Users. 204-208 - Nitin Kumar Sharma

, Sabyasachi Dey
:
Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key Bits. 209-213 - Francesco Antognazza

, Alessandro Barenghi
, Gerardo Pelosi
, Ruggero Susella
:
A Versatile and Unified HQC Hardware Accelerator. 214-219 - Hendrik Graupner

, François-Nima Thobae, Christoph Meinel:
Applying Self-recognition Biometrics to Live Deepfake Detection in Video Conferences. 220-224 - Tanusree Ghosh

, Ruchira Naskar
:
GAN and DM Generated Synthetic Image Detection in the Age of Misinformation. 225-229 - Mario Yaksetig:

Extremely Simple Fail-Stop ECDSA Signatures. 230-234 - Navajit Singh Baban, Jiarui Zhou, Sarani Bhattacharya, Urbi Chatterjee, Sukanta Bhattacharjee, Sanjairaj Vijayavenkataraman, Yong-Ak Song, Debdeep Mukhopadhyay, Krishnendu Chakrabarty, Ramesh Karri:

Physically Unclonable Fingerprints for Authentication. 235-239

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














