Search dblp for Publications

export results for "toc:db/conf/acns/acns2024-3.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acns/0002L24,
  author       = {Siavash Riahi and
                  Orfeas Stefanos Thyfronitis Litos},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor
                  Signatures},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {28--50},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_2},
  doi          = {10.1007/978-3-031-54776-8\_2},
  timestamp    = {Tue, 05 Mar 2024 11:55:03 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/0002L24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AvizhehS24,
  author       = {Sepideh Avizheh and
                  Reihaneh Safavi{-}Naini},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Fair Private Set Intersection Using Smart Contracts},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {74--104},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_4},
  doi          = {10.1007/978-3-031-54776-8\_4},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AvizhehS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GhoshADM24,
  author       = {Soumyadyuti Ghosh and
                  Manaar Alam and
                  Soumyajit Dey and
                  Debdeep Mukhopadhyay},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {"Hello? Is There Anybody in There?" Leakage Assessment of Differential
                  Privacy Mechanisms in Smart Metering Infrastructure},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {163--189},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_7},
  doi          = {10.1007/978-3-031-54776-8\_7},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/GhoshADM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HashemiFG24,
  author       = {Mohammad Hashemi and
                  Domenic Forte and
                  Fatemeh Ganji},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Time Is Money, Friend! Timing Side-Channel Attack Against Garbled
                  Circuit Constructions},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {325--354},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_13},
  doi          = {10.1007/978-3-031-54776-8\_13},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/HashemiFG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HeitmannSMS24,
  author       = {Nico Heitmann and
                  Hendrik Siewert and
                  Sven Moog and
                  Juraj Somorovsky},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Security Analysis of BigBlueButton and eduMEET},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {190--216},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_8},
  doi          = {10.1007/978-3-031-54776-8\_8},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/HeitmannSMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KailusKK24,
  author       = {Adrian Kailus and
                  Dustin Kern and
                  Christoph Krau{\ss}},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Self-sovereign Identity for Electric Vehicle Charging},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {137--162},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_6},
  doi          = {10.1007/978-3-031-54776-8\_6},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/KailusKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KohlerPM24,
  author       = {Daniel K{\"{o}}hler and
                  Wenzel P{\"{u}}nter and
                  Christoph Meinel},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {How Users Investigate Phishing Emails that Lack Traditional Phishing
                  Cues},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {381--411},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_15},
  doi          = {10.1007/978-3-031-54776-8\_15},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/KohlerPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Kumaresan0MRYZ24,
  author       = {Ranjit Kumaresan and
                  Duc Viet Le and
                  Mohsen Minaei and
                  Srinivasan Raghuraman and
                  Yibin Yang and
                  Mahdi Zamani},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Programmable Payment Channels},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {51--73},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_3},
  doi          = {10.1007/978-3-031-54776-8\_3},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Kumaresan0MRYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LinS24,
  author       = {Yunxue Lin and
                  Ling Sun},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Related-Tweak and Related-Key Differential Attacks on {HALFLOOP-48}},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {355--377},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_14},
  doi          = {10.1007/978-3-031-54776-8\_14},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LinS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LorekYZ24,
  author       = {Pawel Lorek and
                  Moti Yung and
                  Filip Zag{\'{o}}rski},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {3--27},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_1},
  doi          = {10.1007/978-3-031-54776-8\_1},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LorekYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MondalKBKV24,
  author       = {Puja Mondal and
                  Suparna Kundu and
                  Sarani Bhattacharya and
                  Angshuman Karmakar and
                  Ingrid Verbauwhede},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism
                  Schemes Using Rowhammer},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {271--300},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_11},
  doi          = {10.1007/978-3-031-54776-8\_11},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MondalKBKV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MukherjeeW0KRWL24,
  author       = {Kunal Mukherjee and
                  Joshua Wiedemeier and
                  Qi Wang and
                  Junpei Kamimura and
                  Junghwan John Rhee and
                  James Wei and
                  Zhichun Li and
                  Xiao Yu and
                  Lu{-}An Tang and
                  Jiaping Gui and
                  Kangkook Jee},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud
                  Security},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {241--268},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_10},
  doi          = {10.1007/978-3-031-54776-8\_10},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MukherjeeW0KRWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NikolaenkoRBB24,
  author       = {Valeria Nikolaenko and
                  Sam Ragsdale and
                  Joseph Bonneau and
                  Dan Boneh},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Powers-of-Tau to the People: Decentralizing Setup Ceremonies},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {105--134},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_5},
  doi          = {10.1007/978-3-031-54776-8\_5},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/NikolaenkoRBB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/RiyadhBDK24,
  author       = {H. T. M. A. Riyadh and
                  Divyanshu Bhardwaj and
                  Adrian Dabrowski and
                  Katharina Krombholz},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Usable Authentication in Virtual Reality: Exploring the Usability
                  of PINs and Gestures},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {412--431},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_16},
  doi          = {10.1007/978-3-031-54776-8\_16},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/RiyadhBDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangBD24,
  author       = {Ruize Wang and
                  Martin Brisfors and
                  Elena Dubrova},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {301--324},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_12},
  doi          = {10.1007/978-3-031-54776-8\_12},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/WangBD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangLL24,
  author       = {Xianbo Wang and
                  Kaixuan Luo and
                  Wing Cheong Lau},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Living a Lie: Security Analysis of Facial Liveness Detection Systems
                  in Mobile Apps},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {432--459},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_17},
  doi          = {10.1007/978-3-031-54776-8\_17},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/WangLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangF024,
  author       = {Naiqian Zhang and
                  Zheyun Feng and
                  Dongpeng Xu},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software
                  Obfuscation},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {217--240},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_9},
  doi          = {10.1007/978-3-031-54776-8\_9},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangF024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-3,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8},
  doi          = {10.1007/978-3-031-54776-8},
  isbn         = {978-3-031-54775-1},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics