default search action
18th ACNS 2020: Rome, Italy - Part II
- Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12147, Springer 2020, ISBN 978-3-030-57877-0
Authentication and Biometrics
- Cezara Benegui, Radu Tudor Ionescu:
A Breach into the Authentication with Built-in Camera (ABC) Protocol. 3-20 - Elmahdi Bentafat, M. Mazhar Rathore, Spiridon Bakiras:
A Practical System for Privacy-Preserving Video Surveillance. 21-39 - Daniel Gardham, Mark Manulis, Constantin Catalin Dragan:
Biometric-Authenticated Searchable Encryption. 40-61 - F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay:
\(\mathsf {BioLocker}\): A Practical Biometric Authentication Mechanism Based on 3D Fingervein. 62-80
Privacy and Anonymity
- Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu:
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. 83-103 - Anh-Tu Hoang, Barbara Carminati, Elena Ferrari:
Cluster-Based Anonymization of Knowledge Graphs. 104-123 - Peter Fenteany, Benjamin Fuller:
Same Point Composable and Nonmalleable Obfuscated Point Functions. 124-144 - Xuan Thanh Do, Duong Hieu Phan, Moti Yung:
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. 145-164
Secure Communication
- Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque:
Multi-Device for Signal. 167-187 - Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. 188-209
Security Analysis
- Stefan Hoffmann, Jens Müller, Jörg Schwenk, Gerd Bumiller:
Powerless Security. 213-232 - Maximilian Hils, Rainer Böhme:
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069. 233-253 - Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. 254-274
Intrusion Detection
- Harm Griffioen, Tim M. Booij, Christian Doerr:
Quality Evaluation of Cyber Threat Intelligence Feeds. 277-296 - Juan E. Rubio, Cristina Alcaraz, Javier López:
Game Theory-Based Approach for Defense Against APTs. 297-320
Software and System Security
- Pierpaolo Santucci, Emiliano Ingrassia, Giulio Picierro, Marco Cesati:
MemShield: GPU-Assisted Software Memory Encryption. 323-343 - Zhangkai Zhang, Yueqiang Cheng, Zhoujun Li:
Super Root: A New Stealthy Rooting Technique on ARM Devices. 344-363 - Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saïdi:
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables. 364-384
Web Security
- Joyanta Debnath, Sze Yiu Chau, Omar Chowdhury:
When TLS Meets Proxy on Mobile. 387-407 - Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Ayumu Kubota, Tran Van Sang, Rie Shigetomi Yamaguchi:
Human Factors in Homograph Attack Recognition. 408-435 - Rosario Gennaro, David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, William E. Skeith III, Anastasiia Timashova:
Publicly Evaluatable Perceptual Hashing. 436-455 - Ilkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
TrollThrottle - Raising the Cost of Astroturfing. 456-476
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.