share record
persistent URL:
Hamza Hammami , Mohammad S. Obaidat , Sadok Ben Yahia : An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data. ICETE (2) 2020 : 110-117 share record
persistent URL:
Hamza Hammami , Mohammad S. Obaidat , Sadok Ben Yahia : A Novel Anonymous Authentication and Key Agreement Scheme for Smart Grid. ICETE (2) 2020 : 357-362 share record
persistent URL:
M. A. Haytom , Christophe Rosenberger , Christophe Charrier , C. Zhu , C. Regnier : Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric System. ICETE (2) 2020 : 451-458 share record
persistent URL:
Cédric Herzog , Valérie Viet Triem Tong , Pierre Wilke , Arnaud Van Straaten , Jean-Louis Lanet : Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures. ICETE (2) 2020 : 302-309 share record
persistent URL:
Martin Holkovic , Michal Bohus , Ondrej Rysavý : Pattern Detection based Network Diagnostics. ICETE (1) 2020 : 35-42 share record
persistent URL:
Sérgio Julião , Mariana Curado Malta : A Study of the WordPress SEO Plugins for Microformats. ICETE (3) 2020 : 154-161 export record
dblp key:
conf/icete/KaanicheBLGR20 share record
persistent URL:
Nesrine Kaaniche , Sana Belguith , Maryline Laurent , Ashish Gehani , Giovanni Russello : Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. ICETE (2) 2020 : 225-237 share record
persistent URL:
Toshihiko Kato , Takumi Enda , Ryo Yamamoto , Satoshi Ohzahata : A Study on Performance of Explicit Rate Report based Congestion Control under Coarse-grained Clock Management. ICETE (1) 2020 : 82-88 share record
persistent URL:
Shabnam Khanna , Ciara Rafferty : Accelerating Homomorphic Encryption using Approximate Computing Techniques. ICETE (2) 2020 : 380-387 share record
persistent URL:
Tomohiro Kobayashi , Keiichi Iwamura , Masaki Inamura : A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature. ICETE (3) 2020 : 98-109 export record
dblp key:
conf/icete/KorniotakisPM20 share record
persistent URL:
John Korniotakis , Panagiotis Papadopoulos , Evangelos P. Markatos : Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes. ICETE (2) 2020 : 192-200 share record
persistent URL:
Sondes Ksibi , Faouzi Jaïdi , Adel Bouhoula : A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems. ICETE (2) 2020 : 652-657 export record
dblp key:
conf/icete/KyriakopoulosNP20 share record
persistent URL:
Constantine A. Kyriakopoulos , Petros Nicopolitidis , Georgios I. Papadimitriou , Emmanouel A. Varvarigos : Adapting Spectrum Resources using Predicted IP Traffic in Optical Networks. ICETE (1) 2020 : 53-58 share record
persistent URL:
Mohamad El Laz , Benjamin Grégoire , Tamara Rezk : Security Analysis of ElGamal Implementations. ICETE (2) 2020 : 310-321 share record
persistent URL:
Abderrahmane Leshob , Maxime Bédard , Hafedh Mili : Robotic Process Automation and Business Rules: A Perfect Match. ICETE (3) 2020 : 119-126 share record
persistent URL:
Chih-Chun Liu , Hsu-Chun Hsiao , Tiffany Hyun-Jin Kim : FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints. ICETE (2) 2020 : 180-191 share record
persistent URL:
Thomas Lorünser , Florian Wohner : Performance Comparison of Two Generic MPC-frameworks with Symmetric Ciphers. ICETE (2) 2020 : 587-594 share record
persistent URL:
Hussein Majed , Hassan N. Noura , Ola Salman , Mohammad Malli , Ali Chehab : Efficient and Secure Statistical DDoS Detection Scheme. ICETE (1) 2020 : 153-161 export record
dblp key:
conf/icete/MarillonnetALK20 share record
persistent URL:
Paul Marillonnet , Mikaël Ates , Maryline Laurent , Nesrine Kaaniche : An Identity-matching Process to Strengthen Trust in Federated-identity Architectures. ICETE (2) 2020 : 142-154 share record
persistent URL:
Alexander Marsalek , Edona Fasllija , Dominik Ziegler : This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining. ICETE (2) 2020 : 388-396 share record
persistent URL:
Peter Maynard , Kieran McLaughlin : Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks. ICETE (2) 2020 : 287-294 share record
persistent URL:
Reem Melki , Hassan Noura , Ali Chehab : An Efficient and Secure Cipher Scheme for Filter Bank Multi-Carrier Systems. ICETE (1) 2020 : 133-141 share record
persistent URL:
Josselin Mignerey , Cyrille Mucchietto , Jean-Baptiste Orfila : Ensuring the Integrity of Outsourced Web Scripts. ICETE (2) 2020 : 155-166 export record
dblp key:
conf/icete/MollaeefarSR20 share record
persistent URL:
Majid Mollaeefar , Alberto Siena , Silvio Ranise : Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection. ICETE (2) 2020 : 349-356 share record
persistent URL:
Bálint Molnár , Galena Pisoni , Ádám Tarcsi : Data Lakes for Insurance Industry: Exploring Challenges and Opportunities for Customer Behaviour Analytics, Risk Assessment, and Industry Adoption. ICETE (3) 2020 : 127-134 share record
persistent URL:
Mohamed Nassar , Elie Chicha , Bechara al Bouna , Richard Chbeir : VIP Blowfish Privacy in Communication Graphs. ICETE (2) 2020 : 459-467 share record
persistent URL:
Omer Nawaz , Markus Fiedler , Siamak Khatibi : Impact of Human and Content Factors on Quality of Experience of Online Video Streaming. ICETE (1) 2020 : 59-66 share record
persistent URL:
Christophe Nègre : Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure. ICETE (2) 2020 : 632-637 share record
persistent URL:
Hassan Nooh , Zhikun Zhu , Soon Xin Ng : Machine Learning Assisted Caching and Adaptive LDPC Coded Modulation for Next Generation Wireless Communications. ICETE (1) 2020 : 67-76 share record
persistent URL:
Hassan N. Noura , Ola Salman , Ali Chehab : Efficient and Secure Cipher Scheme for Limited IoT Devices. ICETE (1) 2020 : 142-150