Search Results - Proceedings of the ... ACM Conference on Computer and Communications Security

Refine Results
  1. 1

    Shorter ZK-SNARKs from square span programs over ideal lattices by Lin, Xi, Cao, Heyang, Liu, Feng-Hao, Wang, Zhedong, Wang, Mingsheng

    ISSN: 2523-3246, 2523-3246
    Published: Singapore Springer Nature Singapore 01.12.2024
    Published in Cybersecurity (Singapore) (01.12.2024)
    “…Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of…”
    Get full text
    Journal Article
  2. 2

    Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic by Belorgey, Mariya Georgieva, Carpov, Sergiu, Deforth, Kevin, Jetchev, Dimitar, Sae-Tang, Abson, Vuille, Marius, Gama, Nicolas, Katz, Jon, Leontiadis, Iraklis, Mohammadi, Mohsen

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.07.2023
    Published in Journal of cryptology (01.07.2023)
    “… (Mohassel and Zhang, in 2017 IEEE symposium on security and privacy (SP), 2017; Mohassel and Rindal, in Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 2018…”
    Get full text
    Journal Article
  3. 3

    Generic constructions of PoRs from codes and instantiations by Lavauzelle Julien, Levy-dit-Vehel Françoise

    ISSN: 1862-2976, 1862-2984
    Published: De Gruyter 01.06.2019
    Published in Journal of mathematical cryptology (01.06.2019)
    “… (typically 512 bits). We adapt the security model initiated by Juels and Kaliski [PoRs: Proofs of retrievability for large files, Proceedings of the 2007 ACM Conference on Computer and Communications Security…”
    Get full text
    Journal Article
  4. 4

    Reusable Fuzzy Extractors for Low-Entropy Distributions by Canetti, Ran, Fuller, Benjamin, Paneth, Omer, Reyzin, Leonid, Smith, Adam

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.01.2021
    Published in Journal of cryptology (01.01.2021)
    “… Reusable fuzzy extractors (Boyen, in Proceedings of the 11th ACM conference on computer and communications security, CCS, ACM, New York, 2004, pp 82–91…”
    Get full text
    Journal Article
  5. 5

    Design and implementation of low-depth pairing-based homomorphic encryption scheme by Herbert, Vincent, Biswas, Bhaskar, Fontaine, Caroline

    ISSN: 2190-8508, 2190-8516
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2019
    Published in Journal of cryptographic engineering (01.06.2019)
    “…–Goh–Nissim (BGN for short) encryption scheme (Boneh et al. in Kilian J (ed) Theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005…”
    Get full text
    Journal Article
  6. 6

    Strongly nonoutsourceable scratch-off puzzles in blockchain by Zeng, Gongxian, Huang, Zhengan, Wang, Yu, Mu, Xin, Zhang, Cheng

    ISSN: 1432-7643, 1433-7479
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2023
    Published in Soft computing (Berlin, Germany) (01.09.2023)
    “… in Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, 2015…”
    Get full text
    Journal Article
  7. 7

    Secure group key establishment revisited by Bohli, Jens-Matthias, González Vasco, María Isabel, Steinwandt, Rainer

    ISSN: 1615-5262, 1615-5270
    Published: Heidelberg Springer Nature B.V 01.07.2007
    “… (LNCS 2248: 290-309, 2001; Proceedings of the 8th ACM conference on computer and communications security (CCS-8), 2001…”
    Get full text
    Journal Article
  8. 8

    Privacy preserving support vector machine based on federated learning for distributed IoT‐enabled data analysis by Chen, Yu‐Chi, Hsu, Song‐Yi, Xie, Xin, Kumari, Saru, Kumar, Sachin, Rodrigues, Joel, Alzahrani, Bander A.

    ISSN: 0824-7935, 1467-8640
    Published: Hoboken Blackwell Publishing Ltd 01.04.2024
    Published in Computational intelligence (01.04.2024)
    “…In a smart city, IoT devices are required to support monitoring of normal operations such as traffic, infrastructure, and the crowd of people. IoT‐enabled…”
    Get full text
    Journal Article
  9. 9

    Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’—a forensic computing perspective by Broucek, Vlasti, Turner, Paul

    ISSN: 2263-8733, 2263-8733
    Published: Paris Springer Paris 01.02.2013
    “… in Proceedings of the 14th ACM conference on computer and communications security, pp 103–115, 2009 ; Pearson in CLOUD’09, pp 44–52, 2009 ; Vouk in J Comput Inf Technol 4…”
    Get full text
    Journal Article
  10. 10

    RAICC: Revealing Atypical Inter-Component Communication in Android Apps by Samhi, Jordan, Bartel, Alexandre, Bissyande, Tegawende F., Klein, Jacques

    ISBN: 1665402962, 9781665402965
    ISSN: 1558-1225
    Published: IEEE 01.05.2021
    “…Inter-Component Communication (ICC) is a key mechanism in Android. It enables developers to compose rich functionalities and explore reuse within and across apps…”
    Get full text
    Conference Proceeding
  11. 11

    Asymptotically Free Broadcast in Constant Expected Time via Packed VSS by Abraham, Ittai, Asharov, Gilad, Patil, Shravani, Patra, Arpita

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer Nature B.V 01.10.2025
    Published in Journal of cryptology (01.10.2025)
    “… While broadcast with worst case t rounds is impossible, it has been shown (Feldman and Micali, in Proceedings of the 20th annual ACM symposium on theory of computing, 1988, Katz and Koo, in Annual international cryptology conference, 2006…”
    Get full text
    Journal Article
  12. 12

    A Partial Replication of "RAICC: Revealing Atypical Inter-Component Communication in Android Apps" by Samhi, Jordan, Bartel, Alexandre, Bissyande, Tegawende F., Klein, Jacques

    ISBN: 1665412194, 9781665412193
    Published: IEEE 01.05.2021
    “…This short paper presents the artefacts related to our ICSE 2021 research paper…”
    Get full text
    Conference Proceeding
  13. 13

    Generalized XML security views by Kuper, Gabriel, Massacci, Fabio, Rassadko, Nataliya

    ISSN: 1615-5262, 1615-5270
    Published: Berlin/Heidelberg Springer-Verlag 01.06.2009
    “… (Proceedings of the 16th International Conference on Data and Applications Security (IFIP’02). IFIP Conference Proceedings, vol…”
    Get full text
    Journal Article
  14. 14

    On-device Malware Detection using Performance-Aware and Robust Collaborative Learning by Shukla, Sanket, Sai Manoj, P D, Kolhe, Gaurav, Rafatirad, Setareh

    Published: IEEE 05.12.2021
    “… Lack of proper security protocols in such devices makes them vulnerable to cyber threats, especially malware attacks…”
    Get full text
    Conference Proceeding
  15. 15

    Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard by Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C., Tapiador, Juan M.E.

    ISSN: 0140-3664, 1873-703X
    Published: Kidlington Elsevier B.V 28.05.2009
    Published in Computer communications (28.05.2009)
    “… Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63–67; D.N. Duc, J. Park, H. Lee, K…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions by Komargodski, Ilan, Segev, Gil, Yogev, Eylon

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.01.2018
    Published in Journal of cryptology (01.01.2018)
    “…) offering various trade-offs between security and efficiency. Previously, Goyal et al. (Proceedings of the 12th theory of cryptography conference (TCC), pp 325–351, 2015…”
    Get full text
    Journal Article
  18. 18

    Autonomous Network Defence using Reinforcement Learning by Foley, Myles, Hicks, Chris, Highnam, Kate, Mavroudis, Vasilios

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 26.09.2024
    Published in arXiv.org (26.09.2024)
    “…In the network security arms race, the defender is significantly disadvantaged as they need to successfully detect and counter every malicious attack…”
    Get full text
    Paper
  19. 19

    Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious by Alon, Bar, Omri, Eran

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.07.2023
    Published in Journal of cryptology (01.07.2023)
    “… (in: Proceedings of the 18th annual ACM symposium on theory of computing (STOC), 1986) has shown that if half of the parties can be corrupted, then no r -round coin-tossing protocol is o ( 1 / r ) -fair…”
    Get full text
    Journal Article
  20. 20

    What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications by Neef, Sebastian, Lorenz Kleissner, Seifert, Jean-Pierre

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 10.06.2024
    Published in arXiv.org (10.06.2024)
    “…Coverage-guided fuzz testing has received significant attention from the research community, with a strong focus on binary applications, greatly disregarding…”
    Get full text
    Paper