Information and Communications Security

Information and Communications Security

26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part II

Kalloniatis, Christos; Lambrinoudakis, Costas; Xenakis, Christos; Katsikas, Sokratis

Springer Verlag, Singapore

11/2024

294

Mole

9789819788002

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Crypto & Applied crypto.



.- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training.



.- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption.



.- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing.



.- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection.



.- Homomorphic encryption.



.- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts.



.- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions.



- Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM.



.- Key agreement protocols and digital signature schemes.



.- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme.



.- Formal analysis of Julia Key Agreement Protocol.



.- New Construction of Code-Based Signature Schemes.



.- Identity-Based Signature from Lattices without Trapdoors.



.- Defences.



.- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps.



.- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot.



.- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning.



.- Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases.



.- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting.
Information security;communications security;cybersecurity;privacy;applied cryptography;cybercrime;mobile security and privacy;critical infrastructure protection;cyber physical systems security;cyber resilience;cyber threat intelligence;digital forensics;formal methods for security;trust management and reputation;web security and privacy