先进制造业知识服务平台
国家科技图书文献中心机械分馆  工信部产业技术基础公共服务平台  国家中小企业公共服务示范平台

会议文集


文集名Applied Cryptography and Network Security
会议名20th International Conference on Applied Cryptography and Network Security (ACNS 2022)
中译名《第二十届国际应用密码学与网络安全会议》
会议日期June 20-23, 2022
会议地点Rome, Italy
出版年2022
馆藏号344103


题名作者出版年
Keyed-Fully Homomorphic Encryption Without Indistinguishability ObfuscationShingo Sato; Keita Emura; Atsushi Takayasu2022
A Performance Evaluation of Pairing-Based Broadcast Encryption SystemsArush Chhatrapati; Susan Hohenberger; James Trombo; Satyanarayana Vusirikala2022
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More VersatileLiang Zhao; Ze Chen; Liqun Chen; Xinyi Huang2022
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-BeetleAkiko Inoue; Tetsu Iwata; Kazuhiko Minematsu2022
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort DeauthenticationPrakash Shrestha; Nitesh Saxena2022
ZLeaks: Passive Inference Attacks on Zigbee Based Smart HomesNarmeen Shafqat; Daniel J. Dubois; David Choffnes; Aaron Schulman; Dinesh Bharadia; Aanjhan Ranganathan2022
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search SchemesMarco Dijkslag; Marc Damie; Florian Hahn; Andreas Peter2022
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting TechniquesZengrui Liu; Prakash Shrestha; Nitesh Saxena2022
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process KnowledgeHerson Esquivel-Vargas; John Henry Castellanos; Marco Caselli; Nils Ole Tippenhauer; Andreas Peter2022
RSA Key Recovery from Digit Equivalence InformationChitchanok Chuengsatiansup; Andrew Feutrill; Rui Qi Sim; Yuval Yarom2022
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number GeneratorsFlorette Martinez2022
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key BridgesHosein Hadipour; Maria Eichlseder2022
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round TripFelix Gunther; Simon Rastikian; Patrick Towa; Thom Wiggers2022
Improving the Privacy of Tor Onion ServicesEdward Eaton; Sajin Sasy; Ian Goldberg2022
Privacy-Preserving Authenticated Key Exchange for Constrained DevicesLoic Ferreira2022
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting ProtocolsAlisa Pankova; Jan Willemson2022
An Approach to Generate Realistic HTTP Parameters for Application Layer DeceptionMerve Sahin; Cedric Hebert; Rocio Cabrera Lozoya2022
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS ProtocolYue Sun; Shichao Lv; Jianzhou You; Yuyan Sun; Xin Chen; Yaowen Zheng; Limin Sun2022
Probing for Passwords - Privacy Implications of SSIDs in Probe RequestsJohanna Ansohn McDougall; Christian Burkert; Daniel Demmler; Monina Schwarz; Vincent Hubbe; Hannes Federrath2022
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-LinkingGhada Arfaoui; Pierre-Alain Fouque; Thibaut Jacques; Pascal Lafourcade; Adina Nedelcu; Cristina Onete; Leo Robert2022
123