×

Found 989 Documents (Results 1–100)

Breaking the quadratic barrier: quantum cryptanalysis of milenage, telecommunications’ cryptographic backbone. (English) Zbl 07839119

Johansson, Thomas (ed.) et al., Post-quantum cryptography. 14th international workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14154, 476-504 (2023).
MSC:  81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI

An enhanced anonymous ECC-based authentication for lightweight application in TMIS. (English) Zbl 1522.94104

El Hajji, Said (ed.) et al., Codes, cryptology and information security. 4th international conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13874, 290-320 (2023).
MSC:  94A62 94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

State machine replication under changing network conditions. (English) Zbl 1524.68010

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 681-710 (2023).
PDFBibTeX XMLCite
Full Text: DOI

A network centrality game for epidemic control. (English) Zbl 1531.91056

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 255-273 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Poly onions: achieving anonymity in the presence of churn. (English) Zbl 1519.94032

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 715-746 (2023).
PDFBibTeX XMLCite
Full Text: DOI

SecureBiNN: 3-party secure computation for binarized neural network inference. (English) Zbl 1524.68307

Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13556, 275-294 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Formalizing delayed adaptive corruptions and the security of flooding networks. (English) Zbl 1515.68087

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 400-430 (2022).
PDFBibTeX XMLCite
Full Text: DOI Link

Invited paper: Cross-chain state machine replication. (English) Zbl 1522.68072

Devismes, Stéphane (ed.) et al., Stabilization, safety, and security of distributed systems. 24th international symposium, SSS 2022, Clermont-Ferrand, France, November 15–17, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13751, 51-65 (2022).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Suborn channels: incentives against timelock bribes. (English) Zbl 1515.91168

Eyal, Ittay (ed.) et al., Financial cryptography and data security. 26th international conference, FC 2022, Grenada, May 2–6, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13411, 488-511 (2022).
MSC:  91G99 94A62
PDFBibTeX XMLCite
Full Text: DOI

Attestation waves: platform trust via remote power analysis. (English) Zbl 1498.68052

Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 460-482 (2021).
MSC:  68M25 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI arXiv

Congestion attacks in payment channel networks. (English) Zbl 1493.91155

Borisov, Nikita (ed.) et al., Financial cryptography and data security. 25th international conference, FC 2021, virtual event, March 1–5, 2021. Revised selected papers. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 12675, 170-188 (2021).
MSC:  91G99 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

FPPW: a fair and privacy preserving watchtower for bitcoin. (English) Zbl 1493.91154

Borisov, Nikita (ed.) et al., Financial cryptography and data security. 25th international conference, FC 2021, virtual event, March 1–5, 2021. Revised selected papers. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 12675, 151-169 (2021).
MSC:  91G99 94A60
PDFBibTeX XMLCite
Full Text: DOI

Smart Internet probing: scanning using adaptive machine learning. (English) Zbl 07526415

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 411-437 (2021).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI

Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI

Adversarial machine learning for 5G communications security. (English) Zbl 07526408

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 270-288 (2021).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI arXiv

Scalable algorithms for identifying stealthy attackers in a game-theoretic framework using deception. (English) Zbl 07526397

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 47-61 (2021).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI

On the round complexity of black-box secure MPC. (English) Zbl 1486.94111

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 214-243 (2021).
MSC:  94A60 68M12 68M14
PDFBibTeX XMLCite
Full Text: DOI

Graph theory applications to deregulated power systems. (English) Zbl 1465.93005

SpringerBriefs in Electrical and Computer Engineering. Cham: Springer (ISBN 978-3-030-57588-5/pbk; 978-3-030-57589-2). ix, 58 p. (2021).
PDFBibTeX XMLCite
Full Text: DOI

Distributed detection of APTs: consensus vs. clustering. (English) Zbl 1511.68048

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 174-192 (2020).
MSC:  68M25 68M10 91D30
PDFBibTeX XMLCite
Full Text: DOI

Pine: enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment. (English) Zbl 1524.68044

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 3-22 (2020).
PDFBibTeX XMLCite
Full Text: DOI Link

Private set intersection in the internet setting from lightweight oblivious PRF. (English) Zbl 1504.94118

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 34-63 (2020).
MSC:  94A60 68M25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Generation of metadata for network control. (English) Zbl 1490.68038

Vishnevskiy, Vladimir M. (ed.) et al., Distributed computer and communication networks. 23rd international conference, DCCN 2020, Moscow, Russia, September 14–18, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12563, 723-735 (2020).
MSC:  68M10 68M25 68R10
PDFBibTeX XMLCite
Full Text: DOI

Game theory on attack graph for cyber deception. (English) Zbl 1484.91030

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 445-456 (2020).
MSC:  91A15 91A10 91A43
PDFBibTeX XMLCite
Full Text: DOI

Partially observable stochastic games for cyber deception against network epidemic. (English) Zbl 1483.68051

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 312-325 (2020).
PDFBibTeX XMLCite
Full Text: DOI

A game theoretic framework for software diversity for network security. (English) Zbl 1483.68042

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 297-311 (2020).
MSC:  68M25 68M10 91A80
PDFBibTeX XMLCite
Full Text: DOI

Cerberus channels: incentivizing watchtowers for Bitcoin. (English) Zbl 1459.94092

Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 346-366 (2020).
MSC:  94A60 91B64 91G20
PDFBibTeX XMLCite
Full Text: DOI

LockDown: balance availability attack against lightning network channels. (English) Zbl 1459.94139

Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 245-263 (2020).
MSC:  94A60 91B64 91G20
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software