


default search action
24th ISC 2021: Virtual Event
- Joseph K. Liu

, Sokratis K. Katsikas
, Weizhi Meng
, Willy Susilo
, Rolly Intan:
Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings. Lecture Notes in Computer Science 13118, Springer 2021, ISBN 978-3-030-91355-7
Cryptology
- Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu, Yang Tao, Yongbin Zhou:

Integer LWE with Non-subgaussian Error and Related Attacks. 3-25 - Teik Guan Tan, Jianying Zhou:

Layering Quantum-Resistance into Classical Digital Signature Algorithms. 26-41 - Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo

, Joseph Tonien
:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. 42-53 - Jiqiang Lu, Jingyu Li:

Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher. 54-69 - Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi

, Ron Steinfeld, Raj Gaire, Shangqi Lai:
A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data. 70-94 - Bowen Liu

, Qiang Tang, Jianying Zhou:
Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT. 95-116 - Xinyan Wang, Fuyou Miao:

Randomized Component Based Secure Secret Reconstruction in Insecure Networks. 117-138 - Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:

Transparency Order of (n, m)-Functions - Its Further Characterization and Applications. 139-157
Web and OS Security
- Seyed Ali Akhavani

, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu:
Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy. 161-176 - Xiaobo Yu, Weizhi Meng

, Lei Zhao, Yining Liu
:
TridentShell: a Covert and Scalable Backdoor Injection Attack on Web Applications. 177-194 - Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis

, Sotiris Ioannidis:
Andromeda: Enabling Secure Enclaves for the Android Ecosystem. 195-217
Network Security
- Andreas Schaad, Dominik Binder:

FEX - A Feature Extractor for Real-Time IDS. 221-237 - Rikima Mitsuhashi

, Akihiro Satoh, Yong Jin, Katsuyoshi Iida
, Takahiro Shinagawa
, Yoshiaki Takai:
Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification. 238-256
Detection of Malware, Attacks and Vulnerabilities
- Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, Apostolis Zarras

:
Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic. 259-278 - Hugo Sbai

, Jassim Happa
, Michael Goldsmith
:
A Novel Behavioural Screenlogger Detection System. 279-295 - Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas

, Aikaterini Mitrokotsa
:
sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning. 296-319 - Hao Sun, Yanjun Tong, Jing Zhao, Zhaoquan Gu:

DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-Architecture Firmware Vulnerability Detection. 320-337
Machine Learning for Security
- Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:

Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. 341-357 - Wei Zong

, Yang-Wai Chow
, Willy Susilo
, Santu Rana
, Svetha Venkatesh
:
Targeted Universal Adversarial Perturbations for Automatic Speech Recognition. 358-373 - Panpan Lu, Qi Li

, Hui Zhu, Giuliano Sovernigo, Xiaodong Lin:
Voxstructor: Voice Reconstruction from Voiceprint. 374-397 - Futai Zou, Qianying Shen, Yuzong Hu:

Word-Map: Using Community Detection Algorithm to Detect AGDs. 398-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














