


default search action
24th ISC 2021: Virtual Event
- Joseph K. Liu
, Sokratis K. Katsikas
, Weizhi Meng
, Willy Susilo
, Rolly Intan:
Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings. Lecture Notes in Computer Science 13118, Springer 2021, ISBN 978-3-030-91355-7
Cryptology
- Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu, Yang Tao, Yongbin Zhou:
Integer LWE with Non-subgaussian Error and Related Attacks. 3-25 - Teik Guan Tan, Jianying Zhou:
Layering Quantum-Resistance into Classical Digital Signature Algorithms. 26-41 - Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. 42-53 - Jiqiang Lu, Jingyu Li:
Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher. 54-69 - Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi
, Ron Steinfeld, Raj Gaire, Shangqi Lai:
A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data. 70-94 - Bowen Liu
, Qiang Tang, Jianying Zhou:
Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT. 95-116 - Xinyan Wang, Fuyou Miao:
Randomized Component Based Secure Secret Reconstruction in Insecure Networks. 117-138 - Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
Transparency Order of (n, m)-Functions - Its Further Characterization and Applications. 139-157
Web and OS Security
- Seyed Ali Akhavani, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu:
Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy. 161-176 - Xiaobo Yu, Weizhi Meng
, Lei Zhao, Yining Liu
:
TridentShell: a Covert and Scalable Backdoor Injection Attack on Web Applications. 177-194 - Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis
, Sotiris Ioannidis:
Andromeda: Enabling Secure Enclaves for the Android Ecosystem. 195-217
Network Security
- Andreas Schaad, Dominik Binder:
FEX - A Feature Extractor for Real-Time IDS. 221-237 - Rikima Mitsuhashi
, Akihiro Satoh, Yong Jin, Katsuyoshi Iida
, Takahiro Shinagawa
, Yoshiaki Takai:
Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification. 238-256
Detection of Malware, Attacks and Vulnerabilities
- Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, Apostolis Zarras
:
Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic. 259-278 - Hugo Sbai
, Jassim Happa
, Michael Goldsmith
:
A Novel Behavioural Screenlogger Detection System. 279-295 - Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa
:
sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning. 296-319 - Hao Sun, Yanjun Tong, Jing Zhao, Zhaoquan Gu:
DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-Architecture Firmware Vulnerability Detection. 320-337
Machine Learning for Security
- Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. 341-357 - Wei Zong
, Yang-Wai Chow
, Willy Susilo
, Santu Rana
, Svetha Venkatesh
:
Targeted Universal Adversarial Perturbations for Automatic Speech Recognition. 358-373 - Panpan Lu, Qi Li
, Hui Zhu, Giuliano Sovernigo, Xiaodong Lin:
Voxstructor: Voice Reconstruction from Voiceprint. 374-397 - Futai Zou, Qianying Shen, Yuzong Hu:
Word-Map: Using Community Detection Algorithm to Detect AGDs. 398-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.