


default search action
19th ACNS 2021: Kamakura, Japan - Workshops
- Jianying Zhou
, Chuadhry Mujeeb Ahmed
, Lejla Batina
, Sudipta Chattopadhyay
, Olga Gadyatskaya
, Chenglu Jin
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Mihalis Maniatakos
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Masaki Shimaoka
, Chunhua Su
, Cong Wang
:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5
AIBlock - Application Intelligence and Blockchain Security
- Lim Yong Zhi
, Jianying Zhou, Martin Saerbeck:
Shaping Blockchain Technology for Securing Supply Chains. 3-18 - Jing Xu, Fei Xu, Chi Xu:
The Obfuscation Method of User Identification System. 19-26 - Panagiotis Chatzigiannis, Konstantinos Chalkias:
Proof of Assets in the Diem Blockchain. 27-41 - Yihong Wen, Cong Peng, Shicheng Wang, Li Li, Min Luo:
An Identity-Based Blind Signature Scheme with Message Recovery from Pairings. 42-55
AIHWS - Artificial Intelligence in Hardware Security
- Anirban Chakraborty, Manaar Alam
, Debdeep Mukhopadhyay:
A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning. 59-77 - Kota Yoshida
, Takeshi Fujino
:
Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment. 78-95 - Lukasz Chmielewski, Leo Weissbart:
On Reverse Engineering Neural Network Implementation on GPU. 96-113 - Lichao Wu, Guilherme Perin:
On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis. 114-132 - Laurens Le Jeune
, Toon Goedemé
, Nele Mentens
:
Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA. 133-150 - Tsunato Nakai, Daisuke Suzuki, Takeshi Fujino:
Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments. 151-168
AIoTS - Artificial Intelligence and Industrial IoT Security
- Cher Chye Lee, Teik Guan Tan, Vishal Sharma, Jianying Zhou:
Quantum Computing Threat Modelling on a Generic CPS Setup. 171-190 - Muhammad M. Roomi
, Daisuke Mashima
, Nandha Kumar Kandasamy
, Partha P. Biswas
:
Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart Grid. 191-208 - Salimah Liyakkathali, Gayathri Sugumar, Aditya Mathur:
Attacklets to Test Anomaly Detectors for Critical Infrastructure. 209-227
CIMSS - Critical Infrastructure and Manufacturing System Security
- Aleksei Kharitonov, Axel Zimmermann:
WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps. 231-251 - Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey:
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain. 252-275
Cloud S&P - Cloud Security and Privacy
- Pierre-Emmanuel Clet, Oana Stan
, Martin Zuber:
BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud? 279-300 - Abdullah Albalawi, Vassilios G. Vassilakis
, Radu Calinescu:
Memory Deduplication as a Protective Factor in Virtualized Systems. 301-317
SCI -Secure Cryptographic Implementation
- Florian Caullery:
A (Bit)slice of Rainbow. 321-331 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security. 332-345 - Shuihai Zhang, Jingfu Wang, Yan Zhang, Bei Pei, Chunli Lyu:
An Efficient Proactive Secret Sharing Scheme for Cloud Storage. 346-357 - Aozhuo Sun, Bingyu Li, Huiqing Wan, Qiongxiao Wang:
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor. 358-377 - Ryu Ishii, Kyosuke Yamashita
, Yusuke Sakai, Takahiro Matsuda, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura
, Tsutomu Matsumoto:
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures. 378-396 - Niusen Chen, Wen Xie, Bo Chen:
Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography. 397-413
SecMT - Security in Mobile Technologies
- Aïda Diop, Nicolas Desmoulins, Jacques Traoré:
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass. 417-435
SiMLA - Security in Machine Learning and Its Applications
- Zihao Qin, Hsiao-Ying Lin, Jie Shi:
Towards Demystifying Adversarial Robustness of Binarized Neural Networks. 439-462 - Yogesh Kulkarni
, Krisha Bhambani
:
Kryptonite: An Adversarial Attack Using Regional Focus. 463-481
Posters
- Laetitia Debesse, Sihem Mesnager, Mounira Msahli:
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack. 485-489 - Yongjin Kim:
POSTER: LHSA: Lightweight Hardware Security Arbitrator. 490-494 - Anubhab Baksi, Banashri Karmakar
, Vishnu Asutosh Dasu
:
POSTER: Another Look at Boyar-Peralta's Algorithm. 495-499 - Anubhab Baksi, Banashri Karmakar
, Vishnu Asutosh Dasu
:
POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools. 500-504

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.