


default search action
22nd ICICS 2020: Copenhagen, Denmark
- Weizhi Meng

, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou
:
Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12282, Springer 2020, ISBN 978-3-030-61077-7
Security I
- Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:

Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. 3-19 - Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:

A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. 20-35 - Erik Bergenholtz, Emiliano Casalicchio, Dragos Ilie, Andrew Moss:

Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks. 36-53 - Anisa Halimi, Erman Ayday:

Profile Matching Across Online Social Networks. 54-70
Crypto I
- Hiroki Okada

, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. 73-90 - Hector B. Hougaard, Atsuko Miyaji

:
Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity. 91-106 - Jie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang

:
CoinBot: A Covert Botnet in the Cryptocurrency Network. 107-125 - Shiwei Xu, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Yan Tong

, Huanguo Zhang:
A Symbolic Model for Systematically Analyzing TEE-Based Protocols. 126-144
Crypto II
- Yanmei Cao, Fangguo Zhang

, Chongzhi Gao, Xiaofeng Chen:
New Practical Public-Key Deniable Encryption. 147-163 - Tianjun Ma, Haixia Xu, Peili Li:

A Blockchain Traceable Scheme with Oversight Function. 164-182 - Sébastien Canard, Adel Hamdi, Fabien Laguillaumie:

Blind Functional Encryption. 183-201 - Guofeng Tang, Tian Qiu:

Lattice HIBE with Faster Trapdoor Delegation and Applications. 202-220
Security II
- Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:

Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. 223-242 - Koen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis

, Nicola Dragoni
:
rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices. 243-258 - Qingjia Huang, Haiming Li, Yun He, Jianwei Tai, Xiaoqi Jia:

PiDicators: An Efficient Artifact to Detect Various VMs. 259-275 - Luis S. Kida, Soham Jayesh Desai, Alpa Trivedi, Reshma Lal, Vincent Scarlata, Santosh Ghosh:

HCC: 100 Gbps AES-GCM Encrypted Inline DMA Transfers Between SGX Enclave and FPGA Accelerator. 276-291
Crypto III
- Marc Fischlin, Felix Günther, Philipp Muth:

Information-Theoretic Security of Cryptographic Channels. 295-311 - Gareth T. Davies

, Christian Janson, Daniel P. Martin:
Client-Oblivious OPRAM. 312-330 - Georg Maringer, Tim Fritzmann, Johanna Sepúlveda:

The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. 331-349 - Yifei Chen

, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti
:
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. 350-365
Crypto IV
- Lin Ding

, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. 369-385 - George Teseleanu

:
A Love Affair Between Bias Amplifiers and Broken Noise Sources. 386-402 - Martin Zuber, Sergiu Carpov, Renaud Sirdey

:
Towards Real-Time Hidden Speaker Recognition by Means of Fully Homomorphic Encryption. 403-421 - Jintai Ding

, Zheng Zhang, Joshua Deaton, Lih-Chung Wang:
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3. 422-440
Security III
- Afsah Anwar, Hisham Alasmary

, Jeman Park
, An Wang, Songqing Chen, David Mohaisen:
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. 443-461 - Florian Fischer

, Matthias Niedermaier
, Thomas Hanka, Peter Knauer
, Dominik Merli:
Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks. 462-478 - Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang:

A Variational Generative Network Based Network Threat Situation Assessment. 479-491
Crypto V
- Sebastian Renner, Enrico Pozzobon

, Jürgen Mottok:
A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers. 495-509 - Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang:

Experimental Comparisons of Verifiable Delay Functions. 510-527 - Alessandro Budroni

, Benjamin Chetioui
, Ermes Franch:
Attacks on Integer-RLWE. 528-542 - Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta:

A Family of Subfield Hyperelliptic Curves for Use in Cryptography. 543-561
Crypto VI
- Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:

Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model. 565-587 - Kaiming Chen

, Jiageng Chen
:
Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree. 588-605

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














