default search action
6th CSP 2022: Tianjin, China
- 6th International Conference on Cryptography, Security and Privacy, CSP 2022, Tianjin, China, January 14-16, 2022. IEEE 2022, ISBN 978-1-6654-7975-2
- Abdulbast A. Abushgra:
Teleporting Qubits Between Participants by Third-Party Center. 1-5 - Sevgi Arca, Rattikorn Hewett:
Anonymity-driven Measures for Privacy. 6-10 - Li Li, Maozhi Xu:
RippleSign: Isogeny-Based Threshold Ring Signatures with Combinatorial Methods. 11-15 - Rainer Rehak, Christian Ricardo Kühne:
The Processing goes far beyond "the app" - Privacy issues of decentralized Digital Contact Tracing using the example of the German Corona-Warn-App. 16-20 - Qian Zhang, Weihong Xie, Xinxian Pan:
Evaluation Study on Privacy Policies of Express Companies Based on Cloud Model. 21-26 - Tomoaki Mimoto, Masayuki Hashimoto, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara, Ryosuke Kojima, Aki Hasegawa, Yasushi Okuno:
Differential Privacy under Incalculable Sensitivity. 27-31 - Eric Sakk:
Computational Refinements for Post-Quantum Elliptic Curve Security. 32-35 - Sarfraz Iqbal:
Analyzing Initial Design Theory Components for Developing Information Security Laboratories. 36-40 - Chenjia Yu, Mehdi Gheisari, Yang Liu:
A Lightweight Advertisement Ecosystem Simulation Platform for Security Analysis. 41-45 - Li Feilin, Li Tao, Hu Aiqu:
A Proactively Defensive Low-Level Decision Center Model of Endogenous Security. 46-50 - Nilupulee Anuradha Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo:
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. 51-55 - Shawn Collins, Emily Wu, Rui Ning:
Context-based Adblocker using Siamese Neural Network. 56-60 - Mohammed M. Alani:
IoTProtect: A Machine-Learning Based IoT Intrusion Detection System. 61-65 - Raha Soleymanzadeh, Rasha Kashef:
The Future Roadmap for Cyber-attack Detection. 66-70 - Jia Wang, Takayuki Sasaki, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto:
Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities. 71-79 - Xinli Xiong, Liang Guo, Yunfeng Zhang, Jingye Zhang:
Cyber-Security Enhanced Network Meta-Model and its Application. 80-85 - Shuangbao Paul Wang, Md Tanvir Arafin, Onyema Osuagwu, Ketchiozo Wandji:
Cyber Threat Analysis and Trustworthy Artificial Intelligence. 86-90 - Jared Mathews, Prosenjit Chatterjee, Shankar Banik:
CoAP-DoS: An IoT Network Intrusion Data Set. 91-95 - Yuxi Cheng, Ziang Jin, Wei Ding:
Analysis of the Propagation of Miner Botnet. 96-101 - Jiaqi Liu, Aiqun Hu, Sheng Li:
Spectrum-based Fingerprint Extraction and Identification Method of 100M Ethernet Card. 102-107 - Tuong Phi Lau:
A Class of Software-Layer DoS Attacks in Node.js Web Apps. 108-113 - Wenxian Guo, Haiqing Yu, Wei Ding:
Vertical Scanning Behavior Analysis of High-Frequency Superpoints. 114-118 - Giampaolo Bella, Cristian Daniele, Mario Raciti:
The AILA Methodology for Automated and Intelligent Likelihood Assignment. 119-123 - Tazar Hussain, Alfie Beard, Liming Chen, Chris D. Nugent, Jun Liu, Adrian Moore:
From Machine Learning Based Intrusion Detection to Cost Sensitive Intrusion Response. 124-130 - Marcin Dabrowski, Piotr Pacyna:
Blockchain-based identity dicovery between heterogenous identity management systems. 131-137 - Dongxia Wang, Jie Cui, Jinghua Wang, Huan Tan, Ming Xu:
Convex Hull Convolutive Non-negative Matrix Factorization Based Speech Enhancement For Multimedia Communication. 138-142 - Yangpan Zhang:
An approach to construct feedforward clock-controlled sequence with high linear complexity. 143-147 - Jiangyong Shi, Ping Kuang, Yongjun Wang, Yuexiang Yang:
A Two-Stage Out-Of-Box Method for Detecting Side-Channel Attacks in Cloud Computing. 148-153 - Jihan Lailatul Atiqoh, Ari Moesriami Barmawi, Farah Afianti:
Blockchain-based Smart Parking System using Ring Learning With Errors based Signature. 154-158
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.