- 2020
- Afsah Anwar, Hisham Alasmary
, Jeman Park, An Wang, Songqing Chen, David Mohaisen:
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. ICICS 2020: 443-461 - Erik Bergenholtz, Emiliano Casalicchio, Dragos Ilie, Andrew Moss:
Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks. ICICS 2020: 36-53 - Alessandro Budroni, Benjamin Chetioui
, Ermes Franch:
Attacks on Integer-RLWE. ICICS 2020: 528-542 - Sébastien Canard, Adel Hamdi, Fabien Laguillaumie:
Blind Functional Encryption. ICICS 2020: 183-201 - Yanmei Cao, Fangguo Zhang
, Chongzhi Gao, Xiaofeng Chen:
New Practical Public-Key Deniable Encryption. ICICS 2020: 147-163 - Kaiming Chen, Jiageng Chen:
Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree. ICICS 2020: 588-605 - Yifei Chen
, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti
:
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. ICICS 2020: 350-365 - Gareth T. Davies
, Christian Janson, Daniel P. Martin:
Client-Oblivious OPRAM. ICICS 2020: 312-330 - Lin Ding
, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. ICICS 2020: 369-385 - Jintai Ding, Zheng Zhang, Joshua Deaton, Lih-Chung Wang:
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3. ICICS 2020: 422-440 - Florian Fischer
, Matthias Niedermaier
, Thomas Hanka, Peter Knauer
, Dominik Merli:
Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks. ICICS 2020: 462-478 - Marc Fischlin, Felix Günther, Philipp Muth:
Information-Theoretic Security of Cryptographic Channels. ICICS 2020: 295-311 - Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta:
A Family of Subfield Hyperelliptic Curves for Use in Cryptography. ICICS 2020: 543-561 - Anisa Halimi, Erman Ayday:
Profile Matching Across Online Social Networks. ICICS 2020: 54-70 - Hector B. Hougaard, Atsuko Miyaji
:
Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity. ICICS 2020: 91-106 - Qingjia Huang, Haiming Li, Yun He, Jianwei Tai, Xiaoqi Jia:
PiDicators: An Efficient Artifact to Detect Various VMs. ICICS 2020: 259-275 - Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. ICICS 2020: 20-35 - Luis S. Kida, Soham Jayesh Desai, Alpa Trivedi, Reshma Lal, Vincent Scarlata, Santosh Ghosh:
HCC: 100 Gbps AES-GCM Encrypted Inline DMA Transfers Between SGX Enclave and FPGA Accelerator. ICICS 2020: 276-291 - Tianjun Ma, Haixia Xu, Peili Li:
A Blockchain Traceable Scheme with Oversight Function. ICICS 2020: 164-182 - Georg Maringer, Tim Fritzmann, Johanna Sepúlveda:
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. ICICS 2020: 331-349 - Hiroki Okada
, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. ICICS 2020: 73-90 - Sebastian Renner, Enrico Pozzobon, Jürgen Mottok:
A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers. ICICS 2020: 495-509 - Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. ICICS 2020: 223-242 - Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. ICICS 2020: 3-19 - Guofeng Tang, Tian Qiu:
Lattice HIBE with Faster Trapdoor Delegation and Applications. ICICS 2020: 202-220 - Koen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis
, Nicola Dragoni
:
rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices. ICICS 2020: 243-258 - George Teseleanu
:
A Love Affair Between Bias Amplifiers and Broken Noise Sources. ICICS 2020: 386-402 - Shiwei Xu, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Yan Tong, Huanguo Zhang:
A Symbolic Model for Systematically Analyzing TEE-Based Protocols. ICICS 2020: 126-144 - Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang:
Experimental Comparisons of Verifiable Delay Functions. ICICS 2020: 510-527 - Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang:
A Variational Generative Network Based Network Threat Situation Assessment. ICICS 2020: 479-491