Search dblp for Publications

export results for "toc:db/conf/acns/acns2020w.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acns/AdepuPMM20,
  author       = {Sridhar Adepu and
                  Venkata Reddy Palleti and
                  Gyanendra Mishra and
                  Aditya Mathur},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Investigation of Cyber Attacks on a Water Distribution System},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {274--291},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_16},
  doi          = {10.1007/978-3-030-61638-0\_16},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AdepuPMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ArceneguiAB20,
  author       = {Javier Arcenegui and
                  Rosario Arjona and
                  Iluminada Baturone},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Secure Management of IoT Devices Based on Blockchain Non-fungible
                  Tokens and Physical Unclonable Functions},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {24--40},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_2},
  doi          = {10.1007/978-3-030-61638-0\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ArceneguiAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AvraamA20,
  author       = {Christos Avraam and
                  Elias Athanasopoulos},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Evaluation of the Adoption and Privacy Risks of Google Prompts},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {508--522},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_28},
  doi          = {10.1007/978-3-030-61638-0\_28},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AvraamA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BetarteCLSZ20,
  author       = {Gustavo Betarte and
                  Maximiliano Cristi{\'{a}} and
                  Carlos Daniel Luna and
                  Adri{\'{a}}n Silveira and
                  Dante Zanarini},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency
                  Protocol},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_1},
  doi          = {10.1007/978-3-030-61638-0\_1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BetarteCLSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Bytes020,
  author       = {Andrei Bytes and
                  Jianying Zhou},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Post-exploitation and Persistence Techniques Against Programmable
                  Logic Controller},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {255--273},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_15},
  doi          = {10.1007/978-3-030-61638-0\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Bytes020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CaputoVM20,
  author       = {Davide Caputo and
                  Luca Verderame and
                  Alessio Merlo},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {MobHide: App-Level Runtime Data Anonymization on Mobile},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {490--507},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_27},
  doi          = {10.1007/978-3-030-61638-0\_27},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CaputoVM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CristianiLM20,
  author       = {Valence Cristiani and
                  Maxime Lecomte and
                  Philippe Maurine},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Leakage Assessment Through Neural Estimation of the Mutual Information},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {144--162},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_9},
  doi          = {10.1007/978-3-030-61638-0\_9},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CristianiLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DangUBM20,
  author       = {Hai{-}Van Dang and
                  Amjad Ullah and
                  Alexandros Bakas and
                  Antonis Michalas},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Attribute-Based Symmetric Searchable Encryption},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {318--336},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_18},
  doi          = {10.1007/978-3-030-61638-0\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DangUBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DruffelH20,
  author       = {Alexander Druffel and
                  Kris Heid},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {DaVinci: Android App Analysis Beyond Frida via Dynamic System Call
                  Instrumentation},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {473--489},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_26},
  doi          = {10.1007/978-3-030-61638-0\_26},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DruffelH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FanPH20,
  author       = {Rong Fan and
                  Jianfeng Pan and
                  Shaomang Huang},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {{ARM-AFL:} Coverage-Guided Fuzzing Framework for ARM-Based IoT Devices},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_14},
  doi          = {10.1007/978-3-030-61638-0\_14},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/FanPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GironMC20,
  author       = {Alexandre Augusto Giron and
                  Jean Everson Martina and
                  Ricardo Felipe Cust{\'{o}}dio},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Bitcoin Blockchain Steganographic Analysis},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {41--57},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_3},
  doi          = {10.1007/978-3-030-61638-0\_3},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/GironMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GuptaRPBSB20,
  author       = {Ashutosh Gupta and
                  Jash Rathod and
                  Dhiren Patel and
                  Jay Bothra and
                  Sanket Shanbhag and
                  Tanmay Bhalerao},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Tokenization of Real Estate Using Blockchain Technology},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {77--90},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_5},
  doi          = {10.1007/978-3-030-61638-0\_5},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/GuptaRPBSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JapYIUBH20,
  author       = {Dirmanto Jap and
                  Ville Yli{-}M{\"{a}}yry and
                  Akira Ito and
                  Rei Ueno and
                  Shivam Bhasin and
                  Naofumi Homma},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Practical Side-Channel Based Model Extraction Attack on Tree-Based
                  Machine Learning Algorithm},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {93--105},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_6},
  doi          = {10.1007/978-3-030-61638-0\_6},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/JapYIUBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KalyschSM20,
  author       = {Anatoli Kalysch and
                  Joschua Schilling and
                  Tilo M{\"{u}}ller},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {On the Evolution of Security Issues in Android App Versions},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {523--541},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_29},
  doi          = {10.1007/978-3-030-61638-0\_29},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/KalyschSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LabafniyaBM20,
  author       = {Mansoureh Labafniya and
                  Shahram Etemadi Borujeni and
                  Nele Mentens},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Evolvable Hardware Architectures on {FPGA} for Side-Channel Security},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {163--180},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_10},
  doi          = {10.1007/978-3-030-61638-0\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LabafniyaBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiKP20,
  author       = {Huimin Li and
                  Marina Krcek and
                  Guilherme Perin},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {A Comparison of Weight Initializers in Deep Learning-Based Side-Channel
                  Analysis},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_8},
  doi          = {10.1007/978-3-030-61638-0\_8},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiLMW20,
  author       = {Bingyu Li and
                  Fengjun Li and
                  Ziqiang Ma and
                  Qianhong Wu},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Exploring the Security of Certificate Transparency in the Wild},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {453--470},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_25},
  doi          = {10.1007/978-3-030-61638-0\_25},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiLMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MaL0Y20,
  author       = {Ziqiang Ma and
                  Bingyu Li and
                  Quanwei Cai and
                  Jun Yang},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Applications and Developments of the Lattice Attack in Side Channel
                  Attacks},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {435--452},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_24},
  doi          = {10.1007/978-3-030-61638-0\_24},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/MaL0Y20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MadiSS20,
  author       = {Abbass Madi and
                  Renaud Sirdey and
                  Oana Stan},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Computing Neural Networks with Homomorphic Encryption and Verifiable
                  Computing},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {295--317},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_17},
  doi          = {10.1007/978-3-030-61638-0\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MadiSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/McCoydPCSRHLW20,
  author       = {Michael McCoyd and
                  Won Park and
                  Steven Chen and
                  Neil Shah and
                  Ryan Roggenkemper and
                  Minjune Hwang and
                  Jason Xinyu Liu and
                  David A. Wagner},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Minority Reports Defense: Defending Against Adversarial Patches},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {564--582},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_31},
  doi          = {10.1007/978-3-030-61638-0\_31},
  timestamp    = {Mon, 29 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/McCoydPCSRHLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PaguadaA20,
  author       = {Servio Paguada and
                  Igor Armendariz},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {The Forgotten Hyperparameter: - Introducing Dilated Convolution for
                  Boosting CNN-Based Side-Channel Attacks},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {217--236},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_13},
  doi          = {10.1007/978-3-030-61638-0\_13},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/PaguadaA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PaguadaRA20,
  author       = {Servio Paguada and
                  Unai Rioja and
                  Igor Armendariz},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Controlling the Deep Learning-Based Side-Channel Analysis: {A} Way
                  to Leverage from Heuristics},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {106--125},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_7},
  doi          = {10.1007/978-3-030-61638-0\_7},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/PaguadaRA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SemalMAK20,
  author       = {Benjamin Semal and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Jan Kalbantner},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {360--377},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_20},
  doi          = {10.1007/978-3-030-61638-0\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SemalMAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SharmaWGB20,
  author       = {Tanusree Sharma and
                  Tian Wang and
                  Carlo Di Giulio and
                  Masooda N. Bashir},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Towards Inclusive Privacy Protections in the Cloud},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {337--359},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_19},
  doi          = {10.1007/978-3-030-61638-0\_19},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SharmaWGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TacyildizEGA20,
  author       = {Yasar Berkay Ta{\c{c}}yildiz and
                  Orhan Ermis and
                  G{\"{u}}rkan G{\"{u}}r and
                  Fatih Alag{\"{o}}z},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Dynamic Group Key Agreement for Resource-constrained Devices Using
                  Blockchains},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {58--76},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_4},
  doi          = {10.1007/978-3-030-61638-0\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/TacyildizEGA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TakatoiSS020,
  author       = {Go Takatoi and
                  Takeshi Sugawara and
                  Kazuo Sakiyama and
                  Yang Li},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Simple Electromagnetic Analysis Against Activation Functions of Deep
                  Neural Networks},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_11},
  doi          = {10.1007/978-3-030-61638-0\_11},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/TakatoiSS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ThebaudLL20,
  author       = {Thomas Thebaud and
                  Ga{\"{e}}l Le Lan and
                  Anthony Larcher},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Unsupervised Labelling of Stolen Handwritten Digit Embeddings with
                  Density Matching},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {545--563},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_30},
  doi          = {10.1007/978-3-030-61638-0\_30},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ThebaudLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Weissbart20,
  author       = {Leo Weissbart},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Performance Analysis of Multilayer Perceptron in Profiling Side-Channel
                  Analysis},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {198--216},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_12},
  doi          = {10.1007/978-3-030-61638-0\_12},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/Weissbart20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuX0WW20,
  author       = {Bowen Xu and
                  Xin Xu and
                  Quanwei Cai and
                  Wei Wang and
                  Qiongxiao Wang},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {On the Verification of Signed Messages},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {417--434},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_23},
  doi          = {10.1007/978-3-030-61638-0\_23},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/XuX0WW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YouC20,
  author       = {Weijing You and
                  Bo Chen},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Proofs of Ownership on Encrypted Cloud Data via Intel {SGX}},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {400--416},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_22},
  doi          = {10.1007/978-3-030-61638-0\_22},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/YouC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangLYZJ20,
  author       = {Yanhua Zhang and
                  Ximeng Liu and
                  Yifeng Yin and
                  Qikun Zhang and
                  Huiwen Jia},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group
                  Signature Scheme with Verifier-Local Revocation},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {381--399},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_21},
  doi          = {10.1007/978-3-030-61638-0\_21},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangLYZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2020w,
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0},
  doi          = {10.1007/978-3-030-61638-0},
  isbn         = {978-3-030-61637-3},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2020w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics