


default search action
ICSP 2024: Jamshedpur, India
- Sihem Mesnager
, Pantelimon Stanica
, Sumit Kumar Debnath
:
Security and Privacy - 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings. Communications in Computer and Information Science 2489, Springer 2025, ISBN 978-3-031-90586-5
Cryptanalysis and Other Attacks
- Akanksha Singh
, Harish Chandra
, Saurabh Rana
:
SIS-Based Signature Schemes and Their Countermeasures: From Vulnerability to Vigilance. 3-12 - Ramprasad Sarkar
, Utkarsh Sahai, Mriganka Mandal
:
On the Security of AMRIBE, Anonymous Multi-receiver Identity-Based Encryption. 13-27 - Kuldeep Namdeo
, Dheerendra Mishra
, Namita Srivastava
:
Algebraic Cryptanalysis and Countermeasures of Lightweight Signature Scheme Based on Multivariate Quadratic Polynomials. 28-43
Boolean Functions
- Zeenath A. U., K. V. Lakshmy
, Chungath Srinivasan
:
Construction of Boolean Functions with 2k-Valued Walsh Spectrum and High Nonlinearity. 47-61 - Suman Dutta
, Aarav Jaiswal, Subhamoy Maitra, Debasish Roy:
On (Noisy) Simon's (Quantum) Algorithm for Multi-shift Boolean Functions. 62-76
Authentication and Authorization, Cyber-physical Systems Security, Privacy-preserving Technologies
- Nilin Prabhaker, Rahul Maurya
, Ghanshyam S. Bopche
, Michael Arock
:
Generation of Believable Fake Integral Equations for Cyber Deception. 79-93 - Teodor-Cosmin Curcudel
:
A Security and Privacy Model for Automotive. 94-108 - Manish Kumar Pandit, Sangram Ray
, Priyanka Das
:
MAP-ECC: Mutual Authentication Protocol for e-Agriculture Using ECC. 109-124
Blockchain and Cryptocurrency, IoT Security and Privacy, Database Security
- Gatram Sravan Kumar, Kamalakanta Sethi, Piyush Joshi, Padmalochan Bera:
Robust Image Steganography: A SLIC and QWT-Based Approach for Secure Data Embedding. 127-141 - Narendra Kumar Ch, Dinesh Kumar
, Amit Prakash
:
A Secure and Decentralized EHR System Using Blockchain and IPFS. 142-153 - V. Valli Kumari, Y. Prasanna Kumar:
SQL Injection Detection Using Recurrent Neural Networks (RNN). 154-167
Quantum Cryptography
- Soumen Bajpayee, Sarbani Sen
, Prithwish Dey, Imon Mukherjee
:
A Quantum Public Key Cryptographic Scheme Using Entangled States and Grover Operator. 171-181 - Vikas Srivastava, Tapaswini Mohanty, Y. Sreenivasa Rao:
An Efficient and Secure Quantum Group Signature with Applications to Vehicular Ad Hoc Networks. 183-194

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.