


default search action
18th ISPEC 2023: Copenhagen, Denmark
- Weizhi Meng

, Zheng Yan
, Vincenzo Piuri
:
Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings. Lecture Notes in Computer Science 14341, Springer 2023, ISBN 978-981-99-7031-5 - Samaneh Mohammadi, Sima Sinaei, Ali Balador, Francesco Flammini

:
Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition. 1-16 - Tran Duc Luong

, Vuong Minh Tien
, Phan The Duy
, Van-Hau Pham
:
FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations. 17-35 - Ahmed E. Samy, Sarunas Girdzijauskas:

Mitigating Sybil Attacks in Federated Learning. 36-51 - Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:

Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. 52-73 - Sebastian Simon, Cezara Petrui, Carlos Pinzón, Catuscia Palamidessi:

Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy. 74-90 - Na Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang:

Cross-Border Data Security from the Perspective of Risk Assessment. 91-104 - Yohei Watanabe, Naoto Yanai, Junji Shikata:

IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures. 105-122 - Jia Zhao, Xinyu Rao, JiQiang Liu, Yue Guo, BoKai Yang:

CVAR-FL IoV Intrusion Detection Framework. 123-137 - Rauli Kaksonen

, Kimmo Halunen
, Marko Laakso, Juha Röning
:
Transparent Security Method for Automating IoT Security Assessments. 138-153 - Kwan Yin Chan

, Handong Cui, Tsz Hon Yuen:
DIDO: Data Provenance from Restricted TLS 1.3 Websites. 154-169 - Mahdieh Safarzadehvahed, Farzaneh Abazari, Fateme Shabani:

QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing. 170-193 - Rabeya Basri

, Gour C. Karmakar
, Joarder Kamruzzaman
, S. H. Shah Newaz
, Linh Nguyen
, Muhammad Usman
:
Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G. 194-208 - P. Mohan Anand, P. V. Sai Charan, Hrushikesh Chunduri, Sandeep K. Shukla:

RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files. 209-229 - Bikash Saha

, Nanda Rani
, Sandeep Kumar Shukla
:
MalXCap: A Method for Malware Capability Extraction. 230-249 - Ying Li, Yuhao Lin, Yongchao Zhong, Qiuling Yue, Jinglu Hu, Wenjie Wang, Huiyang Shi, Yuqing Zhang:

Multimodal Software Defect Severity Prediction Based on Sentiment Probability. 250-265 - Guanghui Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao:

Recovering Multi-prime RSA Keys with Erasures and Errors. 266-283 - Thomas Prantl, Simon Engel, Lukas Horn, Dennis Kaiser, Lukas Iffländer, André Bauer

, Christian Krupitzer, Samuel Kounev:
Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example. 284-298 - Sohto Chiku

, Keisuke Hara
, Junji Shikata:
Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities. 299-314 - Chao Liu, Bozhong Liu:

A New Gadget Decomposition Algorithm with Less Noise Growth in HE Schemes. 315-331 - Tomoya Morooka, Yoshifumi Manabe

, Kazumasa Shinagawa:
Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations. 332-346 - Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj:

Cryptanalysis of Human Identification Protocol with Human-Computable Passwords. 347-364 - Hannes Salin, Lukasz Krzywiecki:

A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS). 365-379 - Yuchen Yin, Qingqing Gan, Cong Zuo, Ning Liu, Changji Wang, Yuning Jiang:

A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability. 380-398 - Philipp Jakubeit

, Andreas Peter
, Maarten van Steen
:
LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity. 399-418 - Yalan Wang

, Liqun Chen
, Long Meng
, Yangguang Tian
:
BAHS: A Blockchain-Aided Hash-Based Signature Scheme. 419-439 - Mingming Wang

, Qianhong Wu
:
Lever: Making Intensive Validation Practical on Blockchain. 440-461 - Andrés Gómez Ramirez, Loui Al Sardy

, Francis Gomez Ramirez:
Tikuna: An Ethereum Blockchain Network Security Monitoring System. 462-476 - Mathieu de Goyon, Atsuko Miyaji:

Isogeny-Based Multi-signature Scheme. 477-491 - Bijoy Das

, Abhijit Das, Dipanwita Roy Chowdhury:
Security Analysis of WAGE Against Division Property Based Cube Attack. 492-506 - Li Liu, Puwen Wei:

When MPC in the Head Meets VC. 507-526 - Sergejs Kozlovics

, Krisjanis Petrucena, Davis Larins, Juris Viksna
:
Quantum Key Distribution as a Service and Its Injection into TLS. 527-545 - Ngo Duc Hoang Son

, Huynh Thai Thi
, Phan The Duy
, Van-Hau Pham
:
XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph. 546-561 - Yuki Nakagawa, Mamoru Mimura

:
XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs. 562-578 - Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:

Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning. 579-594 - Ajay Chandra Korlapati, Sanjeet Kumar Nayak

, Partha Sarathi Chakraborty
, Somanath Tripathy
:
SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain. 595-613

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














