


default search action
22nd ACNS 2024: Abu Dhabi, UAE - Part III
- Christina Pöpper

, Lejla Batina
:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14585, Springer 2024, ISBN 978-3-031-54775-1
Blockchain
- Pawel Lorek

, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. 3-27 - Siavash Riahi, Orfeas Stefanos Thyfronitis Litos:

Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor Signatures. 28-50 - Ranjit Kumaresan, Duc Viet Le, Mohsen Minaei, Srinivasan Raghuraman, Yibin Yang, Mahdi Zamani:

Programmable Payment Channels. 51-73 - Sepideh Avizheh, Reihaneh Safavi-Naini:

Fair Private Set Intersection Using Smart Contracts. 74-104 - Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:

Powers-of-Tau to the People: Decentralizing Setup Ceremonies. 105-134
Smart Infrastructures, Systems and Software
- Adrian Kailus, Dustin Kern, Christoph Krauß

:
Self-sovereign Identity for Electric Vehicle Charging. 137-162 - Soumyadyuti Ghosh, Manaar Alam

, Soumyajit Dey, Debdeep Mukhopadhyay:
"Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure. 163-189 - Nico Heitmann, Hendrik Siewert, Sven Moog, Juraj Somorovsky:

Security Analysis of BigBlueButton and eduMEET. 190-216 - Naiqian Zhang, Zheyun Feng, Dongpeng Xu:

An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation. 217-240 - Kunal Mukherjee

, Joshua Wiedemeier
, Qi Wang, Junpei Kamimura, Junghwan John Rhee, James Wei, Zhichun Li, Xiao Yu, Lu-An Tang, Jiaping Gui, Kangkook Jee
:
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security. 241-268
Attacks
- Puja Mondal

, Suparna Kundu
, Sarani Bhattacharya
, Angshuman Karmakar
, Ingrid Verbauwhede
:
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer. 271-300 - Ruize Wang, Martin Brisfors, Elena Dubrova:

A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation. 301-324 - Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:

Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions. 325-354 - Yunxue Lin, Ling Sun:

Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48. 355-377
Users and Usability
- Daniel Köhler

, Wenzel Pünter
, Christoph Meinel:
How Users Investigate Phishing Emails that Lack Traditional Phishing Cues. 381-411 - H. T. M. A. Riyadh

, Divyanshu Bhardwaj, Adrian Dabrowski
, Katharina Krombholz:
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures. 412-431 - Xianbo Wang

, Kaixuan Luo
, Wing Cheong Lau
:
Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps. 432-459

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














