Search Results - Proceedings of the ... ACM Conference on Computer and Communications Security
-
1
Shorter ZK-SNARKs from square span programs over ideal lattices
ISSN: 2523-3246, 2523-3246Published: Singapore Springer Nature Singapore 01.12.2024Published in Cybersecurity (Singapore) (01.12.2024)“…Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of…”
Get full text
Journal Article -
2
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic
ISSN: 0933-2790, 1432-1378Published: New York Springer US 01.07.2023Published in Journal of cryptology (01.07.2023)“… (Mohassel and Zhang, in 2017 IEEE symposium on security and privacy (SP), 2017; Mohassel and Rindal, in Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 2018…”
Get full text
Journal Article -
3
Generic constructions of PoRs from codes and instantiations
ISSN: 1862-2976, 1862-2984Published: De Gruyter 01.06.2019Published in Journal of mathematical cryptology (01.06.2019)“… (typically 512 bits). We adapt the security model initiated by Juels and Kaliski [PoRs: Proofs of retrievability for large files, Proceedings of the 2007 ACM Conference on Computer and Communications Security…”
Get full text
Journal Article -
4
Reusable Fuzzy Extractors for Low-Entropy Distributions
ISSN: 0933-2790, 1432-1378Published: New York Springer US 01.01.2021Published in Journal of cryptology (01.01.2021)“… Reusable fuzzy extractors (Boyen, in Proceedings of the 11th ACM conference on computer and communications security, CCS, ACM, New York, 2004, pp 82–91…”
Get full text
Journal Article -
5
Design and implementation of low-depth pairing-based homomorphic encryption scheme
ISSN: 2190-8508, 2190-8516Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2019Published in Journal of cryptographic engineering (01.06.2019)“…–Goh–Nissim (BGN for short) encryption scheme (Boneh et al. in Kilian J (ed) Theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005…”
Get full text
Journal Article -
6
Strongly nonoutsourceable scratch-off puzzles in blockchain
ISSN: 1432-7643, 1433-7479Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2023Published in Soft computing (Berlin, Germany) (01.09.2023)“… in Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, 2015…”
Get full text
Journal Article -
7
Secure group key establishment revisited
ISSN: 1615-5262, 1615-5270Published: Heidelberg Springer Nature B.V 01.07.2007Published in International journal of information security (01.07.2007)“… (LNCS 2248: 290-309, 2001; Proceedings of the 8th ACM conference on computer and communications security (CCS-8), 2001…”
Get full text
Journal Article -
8
Privacy preserving support vector machine based on federated learning for distributed IoT‐enabled data analysis
ISSN: 0824-7935, 1467-8640Published: Hoboken Blackwell Publishing Ltd 01.04.2024Published in Computational intelligence (01.04.2024)“…In a smart city, IoT devices are required to support monitoring of normal operations such as traffic, infrastructure, and the crowd of people. IoT‐enabled…”
Get full text
Journal Article -
9
Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’—a forensic computing perspective
ISSN: 2263-8733, 2263-8733Published: Paris Springer Paris 01.02.2013Published in Journal of computer virology and hacking techniques (01.02.2013)“… in Proceedings of the 14th ACM conference on computer and communications security, pp 103–115, 2009 ; Pearson in CLOUD’09, pp 44–52, 2009 ; Vouk in J Comput Inf Technol 4…”
Get full text
Journal Article -
10
RAICC: Revealing Atypical Inter-Component Communication in Android Apps
ISBN: 1665402962, 9781665402965ISSN: 1558-1225Published: IEEE 01.05.2021Published in Proceedings / International Conference on Software Engineering (01.05.2021)“…Inter-Component Communication (ICC) is a key mechanism in Android. It enables developers to compose rich functionalities and explore reuse within and across apps…”
Get full text
Conference Proceeding -
11
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS
ISSN: 0933-2790, 1432-1378Published: New York Springer Nature B.V 01.10.2025Published in Journal of cryptology (01.10.2025)“… While broadcast with worst case t rounds is impossible, it has been shown (Feldman and Micali, in Proceedings of the 20th annual ACM symposium on theory of computing, 1988, Katz and Koo, in Annual international cryptology conference, 2006…”
Get full text
Journal Article -
12
A Partial Replication of "RAICC: Revealing Atypical Inter-Component Communication in Android Apps"
ISBN: 1665412194, 9781665412193Published: IEEE 01.05.2021Published in 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) (01.05.2021)“…This short paper presents the artefacts related to our ICSE 2021 research paper…”
Get full text
Conference Proceeding -
13
Generalized XML security views
ISSN: 1615-5262, 1615-5270Published: Berlin/Heidelberg Springer-Verlag 01.06.2009Published in International journal of information security (01.06.2009)“… (Proceedings of the 16th International Conference on Data and Applications Security (IFIP’02). IFIP Conference Proceedings, vol…”
Get full text
Journal Article -
14
On-device Malware Detection using Performance-Aware and Robust Collaborative Learning
Published: IEEE 05.12.2021Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… Lack of proper security protocols in such devices makes them vulnerable to cyber threats, especially malware attacks…”
Get full text
Conference Proceeding -
15
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
ISSN: 0140-3664, 1873-703XPublished: Kidlington Elsevier B.V 28.05.2009Published in Computer communications (28.05.2009)“… Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63–67; D.N. Duc, J. Park, H. Lee, K…”
Get full text
Journal Article -
16
Invited: Waving the Double-Edged Sword: Building Resilient CAVs with Edge and Cloud Computing
Published: IEEE 09.07.2023Published in 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)“… (vehicle-to-everything) communication expose vulnerabilities to various disturbances and attacks…”
Get full text
Conference Proceeding -
17
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
ISSN: 0933-2790, 1432-1378Published: New York Springer US 01.01.2018Published in Journal of cryptology (01.01.2018)“…) offering various trade-offs between security and efficiency. Previously, Goyal et al. (Proceedings of the 12th theory of cryptography conference (TCC), pp 325–351, 2015…”
Get full text
Journal Article -
18
Autonomous Network Defence using Reinforcement Learning
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 26.09.2024Published in arXiv.org (26.09.2024)“…In the network security arms race, the defender is significantly disadvantaged as they need to successfully detect and counter every malicious attack…”
Get full text
Paper -
19
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
ISSN: 0933-2790, 1432-1378Published: New York Springer US 01.07.2023Published in Journal of cryptology (01.07.2023)“… (in: Proceedings of the 18th annual ACM symposium on theory of computing (STOC), 1986) has shown that if half of the parties can be corrupted, then no r -round coin-tossing protocol is o ( 1 / r ) -fair…”
Get full text
Journal Article -
20
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 10.06.2024Published in arXiv.org (10.06.2024)“…Coverage-guided fuzz testing has received significant attention from the research community, with a strong focus on binary applications, greatly disregarding…”
Get full text
Paper

