Information and Communications Security
Information and Communications Security
26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part II
Xenakis, Christos; Kalloniatis, Christos; Lambrinoudakis, Costas; Katsikas, Sokratis
Springer Verlag, Singapore
01/2025
320
Mole
9789819788002
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training.
.- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption.
.- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing.
.- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection.
.- Homomorphic encryption.
.- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts.
.- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions.
- Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM.
.- Key agreement protocols and digital signature schemes.
.- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme.
.- Formal analysis of Julia Key Agreement Protocol.
.- New Construction of Code-Based Signature Schemes.
.- Identity-Based Signature from Lattices without Trapdoors.
.- Defences.
.- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps.
.- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot.
.- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning.
.- Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases.
.- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting.
.- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training.
.- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption.
.- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing.
.- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection.
.- Homomorphic encryption.
.- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts.
.- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions.
- Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM.
.- Key agreement protocols and digital signature schemes.
.- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme.
.- Formal analysis of Julia Key Agreement Protocol.
.- New Construction of Code-Based Signature Schemes.
.- Identity-Based Signature from Lattices without Trapdoors.
.- Defences.
.- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps.
.- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot.
.- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning.
.- Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases.
.- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting.