


default search action
21st ACNS 2023: Kyoto, Japan - Workshops
- Jianying Zhou
, Lejla Batina
, Zengpeng Li
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Mohammad Ashiqur Rahman
, Jun Shao, Masaki Shimaoka
, Ezekiel O. Soremekun
, Chunhua Su
, Je Sen Teh
, Aleksei Udovenko
, Cong Wang
, Leo Yu Zhang
, Yury Zhauniarovich
:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9
ADSC - Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis
- Huiqin Chen
, Yongqiang Li
, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. 3-22 - Tianyu Zhang:
Comprehensive Preimage Security Evaluations on Rijndael-Based Hashing. 23-42 - Mohammad Vaziri, Vesselin Velichkov:
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak. 43-62
AIBlock - Application Intelligence and Blockchain Security
- Yuxiao Wu, Shoji Kasahara:
Smart Contract-Based E-Voting System Using Homomorphic Encryption and Zero-Knowledge Proof. 67-83 - Ivan Visconti
, Andrea Vitaletti
, Marco Zecchini
:
Preventing Content Cloning in NFT Collections. 84-99 - Mehmet Sabir Kiraz
, Enrique Larraia, Owen Vaughan
:
NFT Trades in Bitcoin with Off-Chain Receipts. 100-117
AIHWS - Artificial Intelligence in Hardware Security
- Thomas Marquet, Elisabeth Oswald
:
A Comparison of Multi-task Learning and Single-Task Learning Approaches. 121-138 - Thomas Schamberger, Maximilian Egger, Lars Tebelmann:
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs - An Evaluation of the ASCAD Databases. 139-158 - Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova:
Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber. 159-177 - Asmita Adhikary, Ileana Buhan:
SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI. 178-195 - Dirmanto Jap, Shivam Bhasin:
Using Model Optimization as Countermeasure against Model Recovery Attacks. 196-209
AIoTS - Artificial Intelligence and Industrial IoT Security
- Ali Hussain Khan, Naveed Ul Hassan, Chuadhry Mujeeb Ahmed, Zartash Afzal Uzmi, Chau Yuen:
Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks. 215-230 - Jiahui Lim, Wen Shei Ong, Utku Tefek, Ertem Esiner:
A Security Policy Engine for Building Energy Management Systems. 231-244 - Eyasu Getahun Chekole, Rajaram Thulasiraman, Jianying Zhou:
EARIC: Exploiting ADC Registers in IoT and Control Systems. 245-265
CIMSS - Critical Infrastructure and Manufacturing System Security
- Guining Geng, Junfeng Miao, Nan Xiao:
Round-Efficient Security Authentication Protocol for 5G Network. 269-283 - Yong Wang, Rui Wang, Xin Liu, Donglan Liu, Hao Zhang, Lei Ma, Fangzhe Zhang, Lili Sun, Zhenghao Li:
A Framework for TLS Implementation Vulnerability Testing in 5G. 284-298 - Sim Siang Tze Victor
, Chuadhry Mujeeb Ahmed
, Koh Yoong Keat Kelvin
, Jianying Zhou
:
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems. 299-320 - Mahender Kumar, Gregory Epiphaniou, Carsten Maple:
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems. 321-335 - Fuyi Wang, Yanping Wang, Leo Yu Zhang, Yuval Hertzog, Michael Loewy, Dominique Valladolid, Julio Medeiros, Muna Al-Hawawreh, Robin Doss:
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM. 336-354
Cloud S&P - Cloud Security and Privacy
- Francesco Intoci, Sinem Sav, Apostolos Pyrgelis, Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference. 359-377 - Aicha Miloudi, Luis Carlos Suárez, Nora Boulahia-Cuppens, Frédéric Cuppens, Stere Preda:
Trust Management Framework for Containerized Workloads Applications to 5G Networks. 378-393
SCI - Secure Cryptographic Implementation
- Wenyuan Li, Wei Wang, Fan Lang, Linli Lu, Heqing Huang:
cPSIR: Circuit-Based Private Stateful Information Retrieval for Private Media Consumption. 399-418 - Tongxia Deng, Ping Li, Shunzhi Yang, Yupeng Zhang, Zheng Gong, Ming Duan, Yiyuan Luo:
A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers. 419-438 - Haosong Zhao, Rui Su, Rui Lin, Jiankuo Dong, Donglong Chen:
Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform. 439-458 - Feng Yang, Hui Cui, Jiwu Jing:
Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation. 459-479 - Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein:
Hybrid Post-quantum Signatures in Hardware Security Keys. 480-499 - Gustavo Banegas, Florian Caullery:
Multi-armed SPHINCS+. 500-514 - Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao:
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. 515-529 - Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret. 530-550
SecMT - Security in Mobile Technologies
- Federico Carboni
, Mauro Conti
, Denis Donadel
, Mariano Sciacco
:
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. 553-570 - Zahra Tarkhani, Anil Madhavapeddy:
Enabling Lightweight Privilege Separation in Applications with MicroGuards. 571-598
SiMLA - Security in Machine Learning and its Applications
- Haibo Zhang
, Zhihua Yao
, Kouichi Sakurai
:
Eliminating Adversarial Perturbations Using Image-to-Image Translation Method. 601-620 - Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno:
Federated Learning Approach for Distributed Ransomware Analysis. 621-641 - Mohammed M. Alani
, Atefeh Mashatan
, Ali Miri
:
Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks. 642-656
Posters
- Michal Glet
, Kamil Kaczynski
:
POSTER: Ransomware Detection Mechanism - Project Status at the Beginning of 2023. 659-663 - Joon Kuy Han, Dennis Wong, Byungkon Kang:
POSTER: AuthZit: Multi-modal Authentication with Visual-Spatial and Text Secrets. 664-668 - Hung-Yu Chien
:
POSTER: Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT. 669-674 - Myung-Hyun Kim, Taek-Young Youn, Seungkwang Lee:
POSTER: Stopping Run-Time Countermeasures in Cryptographic Primitives. 675-679 - Thomas Schiller, Sean C. Mondesire:
POSTER: Swarm-Based IoT Network Penetration Testing by IoT Devices. 680-684 - Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance. 685-689 - Haibo Zhang
, Zhihua Yao
, Kouichi Sakurai
:
POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses. 690-694 - Juris Viksna, Sergejs Kozlovics, Edgars Rencis:
POSTER: Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks. 695-699 - Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems. 700-704 - Neha Joshi, Abhishek Thakur, A. Antony Franklin:
POSTER: PriAuct: Privacy Preserving Auction Mechanism. 705-709 - Ken Watanabe, Kazue Sako:
POSTER: Using Verifiable Credentials for Authentication of UAVs in Logistics. 710-715 - Yuji Suga
:
POSTER: A Card-Based Protocol that Lets You Know How Close Two Parties are in their Opinions (agree/disagree) by Using a Four-Point Likert Scale. 716-721 - Dequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, Weizheng Wang:
POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption. 722-726

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.