长垣产业园区科技文献服务平台

会议文集


文集名Applied Cryptography and Network Security Workshops
会议名22nd International Conference on Applied Cryptography and Network Security (ACNS 2024) Satellite Workshops: AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS
中译名《第二十二届国际应用密码学与网络安全会议 - 讨论会,卷2》
会议日期March 5-8, 2024
会议地点Abu Dhabi, United Arab Emirates
出版年2024
馆藏号352884


题名作者出版年
Forging Tropical SignaturesLorenz Panny2024
Quantum Circuit Design for the Lee-Brickell Based Information Set DecodingSimone Perriello; Alessandro Barenghi; Gerardo Pelosi2024
Projective Space Stern Decoding and Application to SDitHKevin Carrier; Valerian Hatey; Jean-Pierre Tillich2024
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing DetectionAlessandro Brighente; Mauro Conti; Sitora Salaeva; Federico Turrin2024
Model Extraction Attack Without Natural ImagesKota Yoshida; Takeshi Fujino2024
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention MechanismsAmirhossein Ebrahimi Moghaddam; Buvana Ganesh; Paolo Palmieri2024
Differential Privacy with Selected Privacy Budget ε in a Cyber Physical System Using Machine LearningRuilin Wang; Chuadhry Mujeeb Ahmed2024
Construction of 4 × 4 Lightweight Low-Latency Involutory MDS MatricesZheng Zhao; Qun Liu; Yanhong Fan; Meiqin Wang2024
Guidelines for Cyber Risk Management in Autonomous ShippingMeixuan Li; Awais Yousaf; Mark Goh; Jianying Zhou; Sudipta Chattopadhyay2024
Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETsApurva K. Vangujar; Alia Umrani; Paolo Palmieri2024
One Time Chat - A Toy End-to-End Encrypted Web Messaging ServiceKamil Kaczynski; Michal Glet2024
Game Theoretic Modeling of Insider Threats in an OrganizationK. C. Lalropuia; Sanjeev Goyal; Borja Garcia de Soto2024
Smart Appliance Abnormal Electrical Power Consumption DetectionRajesh Nayak; C. D. Jaidhar2024
Towards Secure 5G Infrastructures for Production SystemsMartin Henze; Maximilian Ortmann; Thomas Vogt; Osman Ugus; Kai Hermann; Svenja Nohr; Zeren Lu; Sotiris Michaelides; Angela Massonet; Robert H. Schmitt2024
Cybersecurity Awareness Education: Just as Useful for Technical UsersDaniel Kohler; Michael Bussemeyer; Christoph Meinel2024
Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key BitsNitin Kumar Sharma; Sabyasachi Dey2024
A Versatile and Unified HQC Hardware AcceleratorFrancesco Antognazza; Alessandro Barenghi; Gerardo Pelosi; Ruggero Susella2024
Applying Self-recognition Biometrics to Live Deepfake Detection in Video ConferencesHendrik Graupner; Francois-Nima Thobae; Christoph Meinel2024
GAN and DM Generated Synthetic Image Detection in the Age of MisinformationTanusree Ghosh; Ruchira Naskar2024
Extremely Simple Fail-Stop ECDSA SignaturesMario Yaksetig2024
12