Search dblp for Publications

export results for "toc:db/conf/icics/icics2020.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icics/AnwarAPWCM20,
  author       = {Afsah Anwar and
                  Hisham Alasmary and
                  Jeman Park and
                  An Wang and
                  Songqing Chen and
                  David Mohaisen},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Statically Dissecting Internet of Things Malware: Analysis, Characterization,
                  and Detection},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {443--461},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_25},
  doi          = {10.1007/978-3-030-61078-4\_25},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/AnwarAPWCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BergenholtzCIM20,
  author       = {Erik Bergenholtz and
                  Emiliano Casalicchio and
                  Dragos Ilie and
                  Andrew Moss},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Detection of Metamorphic Malware Packers Using Multilayered {LSTM}
                  Networks},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {36--53},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_3},
  doi          = {10.1007/978-3-030-61078-4\_3},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/BergenholtzCIM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BudroniCF20,
  author       = {Alessandro Budroni and
                  Benjamin Chetioui and
                  Ermes Franch},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Attacks on Integer-RLWE},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {528--542},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_30},
  doi          = {10.1007/978-3-030-61078-4\_30},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BudroniCF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CanardHL20,
  author       = {S{\'{e}}bastien Canard and
                  Adel Hamdi and
                  Fabien Laguillaumie},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Blind Functional Encryption},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {183--201},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_11},
  doi          = {10.1007/978-3-030-61078-4\_11},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CanardHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CaoZGC20,
  author       = {Yanmei Cao and
                  Fangguo Zhang and
                  Chongzhi Gao and
                  Xiaofeng Chen},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {New Practical Public-Key Deniable Encryption},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_9},
  doi          = {10.1007/978-3-030-61078-4\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CaoZGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenC20,
  author       = {Kaiming Chen and
                  Jiageng Chen},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Anonymous End to End Encryption Group Messaging Protocol Based on
                  Asynchronous Ratchet Tree},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {588--605},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_33},
  doi          = {10.1007/978-3-030-61078-4\_33},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ChenC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenLZHLC20,
  author       = {Yifei Chen and
                  Meng Li and
                  Shuli Zheng and
                  Donghui Hu and
                  Chhagan Lal and
                  Mauro Conti},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted
                  Data on Cloud},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {350--365},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_20},
  doi          = {10.1007/978-3-030-61078-4\_20},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChenLZHLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DaviesJM20,
  author       = {Gareth T. Davies and
                  Christian Janson and
                  Daniel P. Martin},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Client-Oblivious {OPRAM}},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {312--330},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_18},
  doi          = {10.1007/978-3-030-61078-4\_18},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/DaviesJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DingWGJG20,
  author       = {Lin Ding and
                  Lei Wang and
                  Dawu Gu and
                  Chenhui Jin and
                  Jie Guan},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A New General Method of Searching for Cubes in Cube Attacks},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {369--385},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_21},
  doi          = {10.1007/978-3-030-61078-4\_21},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/DingWGJG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DingZDW20,
  author       = {Jintai Ding and
                  Zheng Zhang and
                  Joshua Deaton and
                  Lih{-}Chung Wang},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Complete Cryptanalysis of the Post-Quantum Multivariate Signature
                  Scheme Himq-3},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {422--440},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_24},
  doi          = {10.1007/978-3-030-61078-4\_24},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/DingZDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/FischerNHKM20,
  author       = {Florian Fischer and
                  Matthias Niedermaier and
                  Thomas Hanka and
                  Peter Knauer and
                  Dominik Merli},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Analysis of Industrial Device Architectures for Real-Time Operations
                  Under Denial of Service Attacks},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {462--478},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_26},
  doi          = {10.1007/978-3-030-61078-4\_26},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/FischerNHKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/FischlinGM20,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Philipp Muth},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Information-Theoretic Security of Cryptographic Channels},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {295--311},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_17},
  doi          = {10.1007/978-3-030-61078-4\_17},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/FischlinGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GangulyDCM20,
  author       = {Anindya Ganguly and
                  Abhijit Das and
                  Dipanwita Roy Chowdhury and
                  Deval Mehta},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Family of Subfield Hyperelliptic Curves for Use in Cryptography},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {543--561},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_31},
  doi          = {10.1007/978-3-030-61078-4\_31},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/GangulyDCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HalimiA20,
  author       = {Anisa Halimi and
                  Erman Ayday},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Profile Matching Across Online Social Networks},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {54--70},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_4},
  doi          = {10.1007/978-3-030-61078-4\_4},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/HalimiA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HougaardM20,
  author       = {Hector B. Hougaard and
                  Atsuko Miyaji},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {91--106},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_6},
  doi          = {10.1007/978-3-030-61078-4\_6},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/HougaardM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HuangLHTJ20,
  author       = {Qingjia Huang and
                  Haiming Li and
                  Yun He and
                  Jianwei Tai and
                  Xiaoqi Jia},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {PiDicators: An Efficient Artifact to Detect Various VMs},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {259--275},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_15},
  doi          = {10.1007/978-3-030-61078-4\_15},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/HuangLHTJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HuoLWLWWLX20,
  author       = {Dongdong Huo and
                  Chao Liu and
                  Xiao Wang and
                  Mingxuan Li and
                  Yu Wang and
                  Yazhe Wang and
                  Peng Liu and
                  Zhen Xu},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal
                  Systems},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {20--35},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_2},
  doi          = {10.1007/978-3-030-61078-4\_2},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/HuoLWLWWLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KidaDTLSG20,
  author       = {Luis S. Kida and
                  Soham Jayesh Desai and
                  Alpa Trivedi and
                  Reshma Lal and
                  Vincent Scarlata and
                  Santosh Ghosh},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {{HCC:} 100 Gbps {AES-GCM} Encrypted Inline {DMA} Transfers Between
                  {SGX} Enclave and {FPGA} Accelerator},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {276--291},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_16},
  doi          = {10.1007/978-3-030-61078-4\_16},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/KidaDTLSG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaXL20,
  author       = {Tianjun Ma and
                  Haixia Xu and
                  Peili Li},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Blockchain Traceable Scheme with Oversight Function},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {164--182},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_10},
  doi          = {10.1007/978-3-030-61078-4\_10},
  timestamp    = {Sat, 21 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/MaXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaringerFS20,
  author       = {Georg Maringer and
                  Tim Fritzmann and
                  Johanna Sep{\'{u}}lveda},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {The Influence of {LWE/RLWE} Parameters on the Stochastic Dependence
                  of Decryption Failures},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {331--349},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_19},
  doi          = {10.1007/978-3-030-61078-4\_19},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaringerFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/OkadaTFKT20,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR Problem},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_5},
  doi          = {10.1007/978-3-030-61078-4\_5},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/OkadaTFKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/RennerPM20,
  author       = {Sebastian Renner and
                  Enrico Pozzobon and
                  J{\"{u}}rgen Mottok},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Hardware in the Loop Benchmark Suite to Evaluate {NIST} {LWC} Ciphers
                  on Microcontrollers},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {495--509},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_28},
  doi          = {10.1007/978-3-030-61078-4\_28},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/RennerPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SombatruangOMSK20,
  author       = {Nissy Sombatruang and
                  Tan Omiya and
                  Daisuke Miyamoto and
                  M. Angela Sasse and
                  Youki Kadobayashi and
                  Michelle Baddeley},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Attributes Affecting User Decision to Adopt a Virtual Private Network
                  {(VPN)} App},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_13},
  doi          = {10.1007/978-3-030-61078-4\_13},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SombatruangOMSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TakahashiOINGSA20,
  author       = {Junko Takahashi and
                  Keiichi Okabe and
                  Hiroki Itoh and
                  Xuan Thuy Ngo and
                  Sylvain Guilley and
                  Ritu Ranjan Shrivastwa and
                  Mushir Ahmed and
                  Patrick Lejoly},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Machine Learning Based Hardware Trojan Detection Using Electromagnetic
                  Emanation},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_1},
  doi          = {10.1007/978-3-030-61078-4\_1},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TakahashiOINGSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TangQ20,
  author       = {Guofeng Tang and
                  Tian Qiu},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Lattice {HIBE} with Faster Trapdoor Delegation and Applications},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {202--220},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_12},
  doi          = {10.1007/978-3-030-61078-4\_12},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TangQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TangeHSPFD20,
  author       = {Koen Tange and
                  David Howard and
                  Travis Shanahan and
                  Stefano Pepe and
                  Xenofon Fafoutis and
                  Nicola Dragoni},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {rTLS: Lightweight {TLS} Session Resumption for Constrained IoT Devices},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_14},
  doi          = {10.1007/978-3-030-61078-4\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TangeHSPFD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Teseleanu20,
  author       = {George Teseleanu},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Love Affair Between Bias Amplifiers and Broken Noise Sources},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {386--402},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_22},
  doi          = {10.1007/978-3-030-61078-4\_22},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Teseleanu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XuZRWTZ20,
  author       = {Shiwei Xu and
                  Yizhi Zhao and
                  Zhengwei Ren and
                  Lingjuan Wu and
                  Yan Tong and
                  Huanguo Zhang},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Symbolic Model for Systematically Analyzing TEE-Based Protocols},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {126--144},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_8},
  doi          = {10.1007/978-3-030-61078-4\_8},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/XuZRWTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangQWSL20,
  author       = {Zihan Yang and
                  Bo Qin and
                  Qianhong Wu and
                  Wenchang Shi and
                  Bin Liang},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Experimental Comparisons of Verifiable Delay Functions},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {510--527},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_29},
  doi          = {10.1007/978-3-030-61078-4\_29},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YangQWSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangZWXZ20,
  author       = {Hongyu Yang and
                  Renyun Zeng and
                  Fengyan Wang and
                  Guangquan Xu and
                  Jiyong Zhang},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Variational Generative Network Based Network Threat Situation Assessment},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {479--491},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_27},
  doi          = {10.1007/978-3-030-61078-4\_27},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YangZWXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YinCLLCW20,
  author       = {Jie Yin and
                  Xiang Cui and
                  Chaoge Liu and
                  Qixu Liu and
                  Tao Cui and
                  Zhi Wang},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {CoinBot: {A} Covert Botnet in the Cryptocurrency Network},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {107--125},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_7},
  doi          = {10.1007/978-3-030-61078-4\_7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YinCLLCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangWCY20,
  author       = {Linru Zhang and
                  Xiangning Wang and
                  Yuechen Chen and
                  Siu{-}Ming Yiu},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval
                  Model},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {565--587},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_32},
  doi          = {10.1007/978-3-030-61078-4\_32},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangWCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZuberCS20,
  author       = {Martin Zuber and
                  Sergiu Carpov and
                  Renaud Sirdey},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Towards Real-Time Hidden Speaker Recognition by Means of Fully Homomorphic
                  Encryption},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {403--421},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_23},
  doi          = {10.1007/978-3-030-61078-4\_23},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ZuberCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2020,
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4},
  doi          = {10.1007/978-3-030-61078-4},
  isbn         = {978-3-030-61077-7},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics