Foundations and practice of security : 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers (Englisch)
- Neue Suche nach: International Symposium on Foundations and Practice of Security
- Weitere Informationen zu International Symposium on Foundations and Practice of Security:
- http://d-nb.info/gnd/1290952159
- Neue Suche nach: Adams, Carlisle
- Neue Suche nach: Garcia-Alfaro, Joaquin
- Weitere Informationen zu Garcia-Alfaro, Joaquin:
- http://d-nb.info/gnd/1050006496
- Neue Suche nach: Jourdan, Guy-Vincent
- Neue Suche nach: Mounier, Laurent
- Neue Suche nach: Sèdes, Florence
- Weitere Informationen zu Sèdes, Florence:
- http://d-nb.info/gnd/1139725777
- Neue Suche nach: International Symposium on Foundations and Practice of Security
- Weitere Informationen zu International Symposium on Foundations and Practice of Security:
- http://d-nb.info/gnd/1290952159
2023
-
ISBN:
- Konferenzband / Print
-
Titel:Foundations and practice of security : 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers
-
Beteiligte:Adams, Carlisle ( Herausgeber:in ) / Garcia-Alfaro, Joaquin ( Herausgeber:in ) / Jourdan, Guy-Vincent ( Herausgeber:in ) / Mounier, Laurent ( Herausgeber:in ) / Sèdes, Florence ( Herausgeber:in ) / International Symposium on Foundations and Practice of Security ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2023
-
Format / Umfang:xiii, 474 Seiten
-
ISBN:
-
Medientyp:Konferenzband
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Security Analysis of Improved EDHOC ProtocolCottier, Baptiste / Pointcheval, David et al. | 2023
- 19
-
A Survey on Identity-Based Blind SignatureKoscina, Mirko / Lafourcade, Pascal / Marcadet, Gael / Olivier-Anclin, Charles / Robert, Léo et al. | 2023
- 38
-
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AESBrisfors, Martin / Moraitis, Michail / Dubrova, Elena et al. | 2023
- 54
-
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey ZoneBettaieb, Slim / Bidoux, Loic / Blazy, Olivier / Cottier, Baptiste / Pointcheval, David et al. | 2023
- 71
-
A New Class of Trapdoor Verifiable Delay FunctionsZawia, Ahmed / Hasan, M. Anwar et al. | 2023
- 88
-
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with ApplicationsBendoukha, Adda Akram / Stan, Oana / Sirdey, Renaud / Quero, Nicolas / Freitas, Luciano et al. | 2023
- 104
-
Towards a Maturity Model for Crypto-Agility AssessmentHohm, Julian / Heinemann, Andreas / Wiesmaier, Alexander et al. | 2023
- 123
-
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-DistinguisherEbrahimi, Amirhossein / Regazzoni, Francesco / Palmieri, Paolo et al. | 2023
- 142
-
Data-Driven Evaluation of Intrusion Detectors: A Methodological FrameworkAyoubi, Solayman / Blanc, Gregory / Jmila, Houda / Silverston, Thomas / Tixeuil, Sébastien et al. | 2023
- 158
-
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face SpotterMohzary, Muhammad / Almalki, Khalid / Choi, Baek-Young / Song, Sejun et al. | 2023
- 175
-
Where is the Virtual Machine Within CPYTHON?Bonfante, Guillaume / Ithayakumar, Anuyan et al. | 2023
- 192
-
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile NetworksFraunholz, Daniel / Brunke, Dominik / Dumanski, Lorenz / Koenig, Hartmut et al. | 2023
- 208
-
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection AlgorithmsCasanove, Olivier de / Sedes, Florence et al. | 2023
- 221
-
A Taxonomy and Gap-Analysis in Digital Privacy EducationPaul, Sumit Kumar / Knox, D. A. et al. | 2023
- 236
-
Differentially Private Friends RecommendationMacwan, Kamalkumar / Imine, Abdessamad / Rusinowitch, Michael et al. | 2023
- 255
-
Underwater Confidential Communications in JANUSBeaupré, Yannick / Barbeau, Michel / Blouin, Stéphane et al. | 2023
- 271
-
Defense Models for Data Recovery in Industrial Control SystemsJawad, Alvi / Jaskolka, Jason et al. | 2023
- 287
-
SCADA Radio Blackbox Reverse EngineeringLarouche, Jean-Benoit / Roy, Sébastien / Mailhot, Frédéric / Tardif, Pierre-Martin / Frappier, Marc et al. | 2023
- 305
-
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart ContractsGill, Puneet / Ray, Indrani / Takami, Alireza Lotfi / Tripunitara, Mahesh et al. | 2023
- 322
-
Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart ContractsSalimpour, Sahar / Keramat, Farhad / Queralta, Jorge Peria / Westerlund, Tomi et al. | 2023
- 338
-
Money Transfer on Transaction Signature-Based LedgerShiraishi, Momoko / Aida, Hitoshi et al. | 2023
- 355
-
A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency WalletsSans, Thierry / Liu, Ziming / Oh, Kevin et al. | 2023
- 373
-
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart HomesTam, Anthony / Alaca, Furkan / Barrera, David et al. | 2023
- 389
-
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time PasswordsKrentz, Konrad-Felix / Voigt, Thiemo et al. | 2023
- 406
-
Towards Characterizing IoT Software Update PracticesBradley, Conner / Barrera, David et al. | 2023
- 423
-
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network TrafficTahmi, Omar / Talhi, Chamseddine / Challal, Yacine et al. | 2023
- 443
-
A Decision-Support Tool for Experimentation on Zero-Hour Phishing DetectionBurda, Pavlo / Allodi, Luca / Zannone, Nicola et al. | 2023
- 453
-
Deep-Learning-Based Vulnerability Detection in Binary ExecutablesSchaad, Andreas / Binder, Dominik et al. | 2023
- 461
-
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential CryptanalysisFahd, Shah / Afzal, Mehreen / Shah, Dawood / Igbal, Waseem / Hai, Atiya et al. | 2023