Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acns/acns2024-3.bht:"
@inproceedings{DBLP:conf/acns/0002L24, author = {Siavash Riahi and Orfeas Stefanos Thyfronitis Litos}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor Signatures}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {28--50}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_2}, doi = {10.1007/978-3-031-54776-8\_2}, timestamp = {Tue, 05 Mar 2024 11:55:03 +0100}, biburl = {https://dblp.org/rec/conf/acns/0002L24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AvizhehS24, author = {Sepideh Avizheh and Reihaneh Safavi{-}Naini}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Fair Private Set Intersection Using Smart Contracts}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {74--104}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_4}, doi = {10.1007/978-3-031-54776-8\_4}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AvizhehS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GhoshADM24, author = {Soumyadyuti Ghosh and Manaar Alam and Soumyajit Dey and Debdeep Mukhopadhyay}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {"Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {163--189}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_7}, doi = {10.1007/978-3-031-54776-8\_7}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/GhoshADM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HashemiFG24, author = {Mohammad Hashemi and Domenic Forte and Fatemeh Ganji}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {325--354}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_13}, doi = {10.1007/978-3-031-54776-8\_13}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/HashemiFG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HeitmannSMS24, author = {Nico Heitmann and Hendrik Siewert and Sven Moog and Juraj Somorovsky}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Security Analysis of BigBlueButton and eduMEET}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {190--216}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_8}, doi = {10.1007/978-3-031-54776-8\_8}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/HeitmannSMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KailusKK24, author = {Adrian Kailus and Dustin Kern and Christoph Krau{\ss}}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Self-sovereign Identity for Electric Vehicle Charging}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {137--162}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_6}, doi = {10.1007/978-3-031-54776-8\_6}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/KailusKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KohlerPM24, author = {Daniel K{\"{o}}hler and Wenzel P{\"{u}}nter and Christoph Meinel}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {How Users Investigate Phishing Emails that Lack Traditional Phishing Cues}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {381--411}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_15}, doi = {10.1007/978-3-031-54776-8\_15}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/KohlerPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Kumaresan0MRYZ24, author = {Ranjit Kumaresan and Duc Viet Le and Mohsen Minaei and Srinivasan Raghuraman and Yibin Yang and Mahdi Zamani}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Programmable Payment Channels}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {51--73}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_3}, doi = {10.1007/978-3-031-54776-8\_3}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Kumaresan0MRYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LinS24, author = {Yunxue Lin and Ling Sun}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Related-Tweak and Related-Key Differential Attacks on {HALFLOOP-48}}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {355--377}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_14}, doi = {10.1007/978-3-031-54776-8\_14}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LinS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LorekYZ24, author = {Pawel Lorek and Moti Yung and Filip Zag{\'{o}}rski}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {3--27}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_1}, doi = {10.1007/978-3-031-54776-8\_1}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LorekYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MondalKBKV24, author = {Puja Mondal and Suparna Kundu and Sarani Bhattacharya and Angshuman Karmakar and Ingrid Verbauwhede}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {271--300}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_11}, doi = {10.1007/978-3-031-54776-8\_11}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MondalKBKV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MukherjeeW0KRWL24, author = {Kunal Mukherjee and Joshua Wiedemeier and Qi Wang and Junpei Kamimura and Junghwan John Rhee and James Wei and Zhichun Li and Xiao Yu and Lu{-}An Tang and Jiaping Gui and Kangkook Jee}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {241--268}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_10}, doi = {10.1007/978-3-031-54776-8\_10}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MukherjeeW0KRWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NikolaenkoRBB24, author = {Valeria Nikolaenko and Sam Ragsdale and Joseph Bonneau and Dan Boneh}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Powers-of-Tau to the People: Decentralizing Setup Ceremonies}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {105--134}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_5}, doi = {10.1007/978-3-031-54776-8\_5}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/NikolaenkoRBB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/RiyadhBDK24, author = {H. T. M. A. Riyadh and Divyanshu Bhardwaj and Adrian Dabrowski and Katharina Krombholz}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {412--431}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_16}, doi = {10.1007/978-3-031-54776-8\_16}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/RiyadhBDK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangBD24, author = {Ruize Wang and Martin Brisfors and Elena Dubrova}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {301--324}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_12}, doi = {10.1007/978-3-031-54776-8\_12}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/WangBD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangLL24, author = {Xianbo Wang and Kaixuan Luo and Wing Cheong Lau}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {432--459}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_17}, doi = {10.1007/978-3-031-54776-8\_17}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/WangLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangF024, author = {Naiqian Zhang and Zheyun Feng and Dongpeng Xu}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {217--240}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_9}, doi = {10.1007/978-3-031-54776-8\_9}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ZhangF024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-3, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8}, doi = {10.1007/978-3-031-54776-8}, isbn = {978-3-031-54775-1}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.