![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
28th NordSec 2023: Oslo, Norway
- Lothar Fritsch
, Ismail Hassan
, Ebenezer Paintsil:
Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings. Lecture Notes in Computer Science 14324, Springer 2024, ISBN 978-3-031-47747-8
Privacy and Data Protection
- Jonas Palm, Meiko Jensen
:
Analysis of a Consent Management Specification and Prototype Under the GDPR. 3-17 - Philippe Mangeard, Xiufen Yu, Mohammad Mannan, Amr M. Youssef:
No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites. 18-36 - Esko Vuorinen, Panu Puhtila, Sampsa Rauti, Ville Leppänen
:
From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels. 37-53
Cryptography, Protocols, Analysis
- Paul Cotan
, George Teseleanu
:
Small Private Key Attack Against a Family of RSA-Like Cryptosystems. 57-72 - Amirreza Hamidi, Hossein Ghodosi:
Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. 73-86 - Marc Roßberger, Dogan Kesdogan:
Smart Noise Detection for Statistical Disclosure Attacks. 87-103
Cyber Security
- Karianne Kjønås, Gaute Wangen:
Cybersecurity Challenges and Smart Technology Adoption in Norwegian Livestock Farming. 107-125 - Rajendra Patil, Viktoria Fodor
, Mathias Ekstedt
:
Mean Value Analysis of Critical Attack Paths with Multiple Parameters. 126-143 - Mordechai Guri
:
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM. 144-161 - Lars Berg
, Kirsi Helkala
, André Årnes
:
Legal Considerations on Gray Zone Operations - From a Norwegian Perspective. 162-181
Aspects of Trust
- Mario Lins
, René Mayrhofer
, Michael Roland
, Alastair R. Beresford
:
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems. 185-203 - Joakim Brorsson, Martin Gunnarsson:
DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties. 204-222 - Vera Schmitt
, Daniel Sivizaca Conde, Premtim Sahitaj, Sebastian Möller:
What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types. 223-242
Defenses and Forensics
- Thorsten Jenke, Elmar Padilla, Lilli Bruckschen:
Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers. 245-262 - Philipp Eichhammer
, Hans P. Reiser
:
A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks. 263-280 - Samantha Klier
, Harald Baier
:
To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers. 281-303
Machine Learning and Artificial Intelligence in Information Security
- Tanveer Khan
, Khoa Nguyen
, Antonis Michalas
:
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning. 307-329 - Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun:
Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU. 330-349
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.