Innovative Security Solutions for Information Technology and Communications
暂无分享,去创建一个
[1] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[2] Eric Wustrow,et al. Trusted Click: Overcoming Security issues of NFV in the Cloud , 2017, SDN-NFV@CODASPY.
[3] Cas J. F. Cremers,et al. A Comprehensive Symbolic Analysis of TLS 1.3 , 2017, CCS.
[4] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[5] Nicolas Sendrier,et al. Analysis of Information Set Decoding for a Sub-linear Error Weight , 2016, PQCrypto.
[6] Marc Stevens,et al. The First Collision for Full SHA-1 , 2017, CRYPTO.
[7] Nasir D. Memon,et al. Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[8] Jasper G. J. van Woudenberg,et al. Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.
[9] Nikita Veshchikov,et al. SILK: high level of abstraction leakage simulator for side channel analysis , 2014, PPREW@ACSAC.
[10] Raimo Kantola,et al. Cooperation and end‐to‐end in the Internet , 2017, Int. J. Commun. Syst..
[11] Liming Chen,et al. WebGuard: a Web filtering engine combining textual, structural, and visual content-based analysis , 2006, IEEE Transactions on Knowledge and Data Engineering.
[12] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[13] Safya Belghith,et al. Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .
[14] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[15] Cynthia Dwork,et al. A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.
[16] Jean-Charles Faugère,et al. Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups , 2014, IEEE Transactions on Information Theory.
[17] Andreas Theissler,et al. Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection , 2017, Knowl. Based Syst..
[18] Alberto L. Sangiovanni-Vincentelli,et al. Security-Aware Modeling and Efficient Mapping for CAN-Based Real-Time Distributed Automotive Systems , 2015, IEEE Embedded Systems Letters.
[19] Chris Jay Hoofnagle,et al. Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.
[20] Phillip Rogaway,et al. The Moral Character of Cryptographic Work , 2015, IACR Cryptol. ePrint Arch..
[21] Arjen K. Lenstra,et al. Factorization of a 768-Bit RSA Modulus , 2010, CRYPTO.
[22] Ross Anderson,et al. Tools and Technology of Internet Filtering , 2008 .
[23] John Kelsey,et al. Recommendation for the Entropy Sources Used for Random Bit Generation , 2018 .
[24] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[25] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[26] Juan Carlos De Martin,et al. Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[27] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[28] Huy Kang Kim,et al. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[29] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[30] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[31] N. Asokan,et al. The Untapped Potential of Trusted Execution Environments on Mobile Devices , 2013, IEEE Security & Privacy.
[32] Ayoub Otmani,et al. Square Code Attack on a Modified Sidelnikov Cryptosystem , 2015, C2SI.
[33] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[34] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[35] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[36] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[37] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[38] Konstantinos Demertzis,et al. An innovative soft computing system for smart energy grids cybersecurity , 2018 .
[39] Dongsu Han,et al. SGX-Box: Enabling Visibility on Encrypted Traffic using a Secure Middlebox Module , 2017, APNet.
[40] Tibor Jager,et al. On the Security of the PKCS#1 v1.5 Signature Scheme , 2018, IACR Cryptol. ePrint Arch..
[41] Nicolas Sendrier,et al. On the Security of the McEliece Public-Key Cryptosystem , 2002 .
[42] Gianluca Stringhini,et al. PayBreak: Defense Against Cryptographic Ransomware , 2017, AsiaCCS.
[43] Marc Stevens,et al. Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities , 2007, EUROCRYPT.
[44] Diana Maimut,et al. Post-quantum Cryptography and a (Qu)Bit More , 2018, SecITC.
[45] Ron Steinfeld,et al. Efficient Public Key Encryption Based on Ideal Lattices , 2009, ASIACRYPT.
[46] Silvia Giordano,et al. UPRISE-IoT: User-Centric Privacy & Security in the IoT , 2019, Security and Privacy in the Internet of Things.
[47] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[48] Enrico Thomae,et al. Decoding Random Linear Codes in Õ(20.054n) , 2012 .
[49] María Naya-Plasencia,et al. Breaking Symmetric Cryptosystems Using Quantum Period Finding , 2016, CRYPTO.
[50] Jung Hee Cheon,et al. Batch Fully Homomorphic Encryption over the Integers , 2013, EUROCRYPT.
[51] Alexander Russell,et al. Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts , 2016, EUROCRYPT.
[52] Chih-Min Wang,et al. A PUF scheme using competing oxide rupture with bit error rate approaching zero , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).
[53] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[54] Philippe Andouard,et al. A Smart Card Power Analysis Simulator , 2009, 2009 International Conference on Computational Science and Engineering.
[55] Keisuke Tanaka,et al. Security of Digital Signature Schemes in Weakened Random Oracle Models , 2008, Public Key Cryptography.
[56] S. Li,et al. On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.
[57] Thomas M. Chen,et al. Web Filtering and Censoring , 2010, Computer.
[58] Kenneth G. Paterson,et al. Non-Interactive Key Exchange , 2012, IACR Cryptol. ePrint Arch..
[59] Rajarshi Sanyal. Challenges in interoperability and roaming between LTE - Legacy core for mobility management, routing, real time charging , 2011, 2011 Technical Symposium at ITU Telecom World (ITU WT).
[60] François-Xavier Standaert,et al. Univariate side channel attacks and leakage modeling , 2011, Journal of Cryptographic Engineering.
[61] Wangjie Qiu,et al. A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems , 2015, Nonlinear Dynamics.
[62] Muhammad Abdul Qadir,et al. Using hidden markov model for dynamic malware analysis: First impressions , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[63] A. Haar. Zur Theorie der orthogonalen Funktionensysteme , 1910 .
[64] Philip H. W. Leong,et al. gramEvol: Grammatical Evolution in R , 2016 .
[65] Kristin E. Lauter,et al. Weak Instances of PLWE , 2014, Selected Areas in Cryptography.
[66] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[67] Jeffrey A. Cichonski,et al. Guide to LTE Security , 2017 .
[68] Bandar Aldawsari,et al. Security-Oriented Cloud Platform for SOA-Based SCADA , 2015, 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[69] T. L. McCluskey,et al. Intelligent rule-based phishing websites classification , 2014, IET Inf. Secur..
[70] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[71] Hardeep Singh,et al. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks , 2016, Applied Clinical Informatics.
[72] Yunus Emre Işık,et al. Intrusion detection with autoencoder based deep learning machine , 2017, 2017 25th Signal Processing and Communications Applications Conference (SIU).
[73] Benoit Baudry,et al. Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale , 2018, WWW.
[74] Gildas Avoine,et al. Strong Authentication and Strong Integrity (SASI) Is Not That Strong , 2010, RFIDSec.
[75] Yanfeng Wang,et al. An encryption scheme using DNA technology , 2008, 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications.
[76] Silvio Micali,et al. Simple and fast optimistic protocols for fair electronic exchange , 2003, PODC '03.
[77] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[78] S. Li,et al. Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .
[79] Victor I. Chang,et al. A Categorisation of Cloud Computing Business Models , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[80] Tim Güneysu,et al. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices , 2012, CARDIS.
[81] Chris Peikert,et al. A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..
[82] Alfredo De Santis,et al. On Ultralightweight RFID Authentication Protocols , 2011, IEEE Transactions on Dependable and Secure Computing.
[83] Yi Mu,et al. Witness-based searchable encryption , 2018, Inf. Sci..
[84] Amin Shokrollahi,et al. Cryptanalysis of the Sidelnikov Cryptosystem , 2007, EUROCRYPT.
[85] Jakob Jonsson,et al. PKCS #1: RSA Cryptography Specifications Version 2.2 , 2016, RFC.
[86] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[87] J. Euzenat,et al. Ontology Matching , 2007, Springer Berlin Heidelberg.
[88] Michele Colajanni,et al. Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms , 2016, 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI).
[89] Eugene Prange,et al. The use of information sets in decoding cyclic codes , 1962, IRE Trans. Inf. Theory.
[90] Vibhakar Mansotra,et al. Machine Learning Techniques used for the Detection and Analysis of Modern Types of DDoS Attacks , 2017 .
[91] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[92] Young-Sik Kim,et al. New McEliece cryptosystem based on polar codes as a candidate for post-quantum cryptography , 2014, 2014 14th International Symposium on Communications and Information Technologies (ISCIT).
[93] Chris Jay Hoofnagle,et al. Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning , 2011 .
[94] Vinod Vaikuntanathan,et al. Predicate Encryption for Circuits from LWE , 2015, CRYPTO.
[95] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[96] Diana Maimut,et al. A Unified Security Perspective on Legally Fair Contract Signing Protocols , 2018, IACR Cryptol. ePrint Arch..
[97] Eul Gyu Im,et al. Malware classification using instruction frequencies , 2011, RACS.
[98] Edward M. McCreight,et al. A Space-Economical Suffix Tree Construction Algorithm , 1976, JACM.
[99] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .
[100] Je-Won Kang,et al. A Novel Intrusion Detection Method Using Deep Neural Network for In-Vehicle Network Security , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).
[101] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[102] Andrey Bogdanov,et al. Lightweight cryptography for constrained devices , 2014, 2014 International Symposium on Integrated Circuits (ISIC).
[103] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[104] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[105] Taesoo Kim,et al. STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud , 2012, USENIX Security Symposium.
[106] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[107] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[108] Gorka Irazoqui Apecechea,et al. Wait a Minute! A fast, Cross-VM Attack on AES , 2014, RAID.
[109] R. Nigel Horspool,et al. Sliding window and control flow weight for metamorphic malware detection , 2014, Journal of Computer Virology and Hacking Techniques.
[110] Ayoub Otmani,et al. Algebraic properties of polar codes from a new polynomial formalism , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[111] Michael O'Neill,et al. Grammatical Evolution: Evolving Programs for an Arbitrary Language , 1998, EuroGP.
[112] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[113] A. Behl,et al. An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.
[114] Yannick Seurin,et al. Good Variants of HB+ Are Hard to Find , 2008, Financial Cryptography.
[115] N. Sendrier. On the Use of Structured Codes in Code Based Cryptography1 , 2012 .
[116] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[117] Carl A. Gunter,et al. Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps , 2017, ACSAC.
[118] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[119] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[120] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[121] Felix C. Freiling,et al. A structured approach to anomaly detection for in-vehicle networks , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[122] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[123] Ling Gao,et al. An Intrusion Detection Model Based on Deep Belief Networks , 2014, 2014 Second International Conference on Advanced Cloud and Big Data.
[124] Tim Güneysu,et al. Using Data Contention in Dual-ported Memories for Security Applications , 2010, Journal of Signal Processing Systems.
[125] Salvatore Loreto,et al. Explicit Trusted Proxy in HTTP/2.0 , 2014 .
[126] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[127] Xingyuan Wang,et al. Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..
[128] Dominic Wilson,et al. Using grammatical evolution for evolving intrusion detection rules , 2006 .
[129] Ting-Yi Chang. Dynamically generate a long-lived private key based on password keystroke features and neural network , 2012, Inf. Sci..
[130] Pedro García-Teodoro,et al. R-Locker: Thwarting ransomware action through a honeyfile-based approach , 2018, Comput. Secur..
[131] Eunjin Kim,et al. A Novel Approach to Detect Malware Based on API Call Sequence Analysis , 2015, Int. J. Distributed Sens. Networks.
[132] Lequan Min,et al. Chaos-based image encryption scheme combining DNA coding and entropy , 2015, Multimedia Tools and Applications.
[133] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[134] Sylvain Guilley,et al. Random Numbers Generation: Tests and Attacks , 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[135] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[136] Antoine Joux,et al. Decoding Random Binary Linear Codes in 2n/20: How 1+1=0 Improves Information Set Decoding , 2012, IACR Cryptol. ePrint Arch..
[137] Edgar Weippl,et al. On Security Research Towards Future Mobile Network Generations , 2017, IEEE Communications Surveys & Tutorials.
[138] Damien Stehlé,et al. On the Ring-LWE and Polynomial-LWE problems , 2018, IACR Cryptol. ePrint Arch..
[139] Gernot Heiser,et al. CATalyst: Defeating last-level cache side channel attacks in cloud computing , 2016, 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA).
[140] Hiroaki Takada,et al. CaCAN: Centralized Authentication System in CAN (Controller Area Network) , 2016 .
[141] Pavel Celeda,et al. HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting , 2016, EURASIP J. Inf. Secur..
[142] James V. Hansen,et al. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection , 2007, Decis. Support Syst..
[143] Michael M. Swift,et al. Scheduler-based Defenses against Cross-VM Side-channels , 2014, USENIX Security Symposium.
[144] Silke Holtmanns. Interconnection Security Standards - We Are All Connected , 2016, J. ICT Stand..
[145] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[146] T Subbulakshmi,et al. Dynamic malware analysis using machine learning algorithm , 2017, 2017 International Conference on Intelligent Sustainable Systems (ICISS).
[147] Andrew McCallum,et al. A comparison of event models for naive bayes text classification , 1998, AAAI 1998.
[148] Trent Jaeger,et al. TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone , 2017, MobiSys.
[149] Xiao Tan,et al. Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes , 2012, ACISP.
[150] Jun Zhao,et al. Recurrent Convolutional Neural Networks for Text Classification , 2015, AAAI.
[151] Jinsoo Jang,et al. PrivateZone: Providing a Private Execution Environment Using ARM TrustZone , 2018, IEEE Transactions on Dependable and Secure Computing.
[152] P. Nagabhushan,et al. A New Image Scrambling Scheme through Chaotic Permutation and Geometric Grid based Noise Induction , 2013 .
[153] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[154] Nick Sullivan,et al. The Security Impact of HTTPS Interception , 2017, NDSS.
[155] Chris Fallin,et al. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[156] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[157] Guy Lapalme,et al. A systematic analysis of performance measures for classification tasks , 2009, Inf. Process. Manag..
[158] Christophe Clavier,et al. SCATTER : A New Dimension in Side-Channel , 2018, IACR Cryptol. ePrint Arch..
[159] Onur Mutlu,et al. Vulnerabilities in MLC NAND Flash Memory Programming: Experimental Analysis, Exploits, and Mitigation Techniques , 2017, 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA).
[160] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[161] Peter Schwabe,et al. NaCl on 8-Bit AVR Microcontrollers , 2013, AFRICACRYPT.
[162] Ada Wai-Chee Fu,et al. Efficient time series matching by wavelets , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[163] Simon Josefsson,et al. Edwards-Curve Digital Signature Algorithm (EdDSA) , 2017, RFC.
[164] Bogdan Groza,et al. Source Identification Using Signal Characteristics in Controller Area Networks , 2014, IEEE Signal Processing Letters.
[165] Oriol Sallent,et al. LTE: the technology driver for future public safety communications , 2013, IEEE Communications Magazine.
[166] Wouter Joosen,et al. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting , 2013, 2013 IEEE Symposium on Security and Privacy.
[167] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[168] Tommaso Gagliardoni,et al. Unforgeable Quantum Encryption , 2017, IACR Cryptol. ePrint Arch..
[169] Sylvain Guilley,et al. “Re-synchronization by moments”: An efficient solution to align Side-Channel traces , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[170] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[171] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[172] Anne Canteaut,et al. A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem , 1994 .
[173] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[174] Ayoub Otmani,et al. Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes , 2016, PQCrypto.
[175] Kenneth G. Paterson,et al. Multilinear Maps from Obfuscation , 2016, Journal of Cryptology.
[176] Danny Hendler,et al. Detecting Malicious PowerShell Commands using Deep Neural Networks , 2018, AsiaCCS.
[177] Craig Gentry,et al. Space-Efficient Identity Based EncryptionWithout Pairings , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[178] Reyadh Shaker Naoum,et al. An Enhanced Resilient Backpropagation Artificial Neural Network for Intrusion Detection System , 2012 .
[179] Ueli Maurer,et al. Unifying Zero-Knowledge Proofs of Knowledge , 2009, AFRICACRYPT.
[180] Tzu-Yang Hsu,et al. Privacy-aware and blockchain connected gateways for users to access legacy IoT devices , 2017, 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE).
[181] Eitan M. Gurari,et al. Introduction to the theory of computation , 1989 .
[182] Mu Zhang,et al. Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation , 2018, NDSS.
[183] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[184] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[185] Yiran Chen,et al. A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .
[186] D. Upton,et al. Improving data transparency in clinical trials using blockchain smart contracts , 2016, F1000Research.
[187] Ruby B. Lee,et al. A novel cache architecture with enhanced performance and security , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.
[188] Xiaolin Cao,et al. Application-oriented SHA-256 hardware design for low-cost RFID , 2012, 2012 IEEE International Symposium on Circuits and Systems.
[189] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[190] Hoda Mohammadzade,et al. Pixel-Level Alignment of Facial Images for High Accuracy Recognition Using Ensemble of Patches , 2018, Journal of the Optical Society of America. A, Optics, image science, and vision.
[191] B. B. Gupta,et al. A Survey of Phishing Email Filtering Techniques , 2013, IEEE Communications Surveys & Tutorials.
[192] Dominique Unruh,et al. Random Oracles and Auxiliary Input , 2007, CRYPTO.
[193] Ganesh Kumar,et al. Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.
[194] Ivan Damgård,et al. On the Randomness of Legendre and Jacobi Sequences , 1990, CRYPTO.
[195] Huy Kang Kim,et al. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network , 2016, 2016 International Conference on Information Networking (ICOIN).
[196] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[197] Dong Seong Kim,et al. A Framework for Modeling and Assessing Security of the Internet of Things , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).
[198] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[199] Duen-Ren Liu,et al. Hybrid Recommendation Approaches: Collaborative Filtering via Valuable Content Information , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[200] Chakib Bekara,et al. Security Issues and Challenges for the IoT-based Smart Grid , 2014, FNC/MobiSPC.
[201] Danfeng Zhang,et al. Ironclad Apps: End-to-End Security via Automated Full-System Verification , 2014, OSDI.
[202] Bernadette Dorizzi,et al. Application of Biometrics to Obtain High Entropy Cryptographic Keys , 2009 .
[203] Julien Eynard,et al. A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes , 2016, SAC.
[204] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[205] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[206] Yong Wang,et al. A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..
[207] Wei Lu,et al. Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..
[208] Bing Wu,et al. A Survey of Collaborative Filtering-Based Recommender Systems for Mobile Internet Applications , 2016, IEEE Access.
[209] Elisabeth Oswald,et al. A fair evaluation framework for comparing side-channel distinguishers , 2011, Journal of Cryptographic Engineering.
[210] Juan E. Tapiador,et al. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations , 2008, ArXiv.
[211] Mathias Payer,et al. HexPADS: A Platform to Detect "Stealth" Attacks , 2016, ESSoS.
[212] Enrico Blanzieri,et al. A survey of learning-based techniques of email spam filtering , 2008, Artificial Intelligence Review.
[213] Dominic Bucerzan,et al. Evolution of the McEliece Public Key Encryption Scheme , 2017, SECITC.
[214] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[215] Carl Pomerance,et al. A Tale of Two Sieves , 1998 .
[216] Arenberg Doctoral,et al. Physically Unclonable Functions: Constructions, Properties and Applications , 2012 .
[217] Haibo Chen,et al. Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[218] Gilles Brassard,et al. Strengths and Weaknesses of Quantum Computing , 1997, SIAM J. Comput..
[219] Vincent Nicomette,et al. A language-based intrusion detection approach for automotive embedded networks , 2015, Int. J. Embed. Syst..
[220] François Chollet,et al. Keras: The Python Deep Learning library , 2018 .
[221] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[222] Jean-Charles Faugère,et al. A Distinguisher for High-Rate McEliece Cryptosystems , 2011, IEEE Transactions on Information Theory.
[223] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[224] Pavlos S. Efraimidis,et al. A Blockchain-Based Notarization Service for Biomedical Knowledge Retrieval , 2018, Computational and structural biotechnology journal.
[225] Arjen K. Lenstra,et al. Computation of a 768-Bit Prime Field Discrete Logarithm , 2017, EUROCRYPT.
[226] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[227] Tanja Lange,et al. Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..
[228] Julien Bringer,et al. Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function , 2008, SCN.
[229] D. Coppersmith. Solving homogeneous linear equations over GF (2) via block Wiedemann algorithm , 1994 .
[230] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[231] Mehmet Kayaalp,et al. RIC: Relaxed Inclusion Caches for mitigating LLC side-channel attacks , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[232] Dong Hoon Lee,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..
[233] Arvind Narayanan,et al. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.
[234] Keiichi Iwamura,et al. Hierarchical-Structured Key Exchange Scheme for Large-Scale Mesh-Type Wireless Sensor Networks , 2015 .
[235] Paolo D'Arco,et al. Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols , 2018, SEC.
[236] Qiang Zhang,et al. An Efficient Approach for DNA Fractal-based Image Encryption , 2011 .
[237] Axel Legay,et al. Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks , 2018, 2018 7th International Conference on Computers Communications and Control (ICCCC).
[238] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[239] Vincenzo Iovino,et al. Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.
[240] Dumitru Daniel Dinu. Efficient and Secure Implementations of Lightweight Symmetric Cryptographic Primitives , 2017 .
[241] Moti Yung,et al. Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[242] Alfredo De Santis,et al. Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol , 2008, AFRICACRYPT.
[243] S. Kanade,et al. Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.
[244] Dong Hoon Lee,et al. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks , 2016, IEEE Transactions on Vehicular Technology.
[245] Gorka Irazoqui Apecechea,et al. Fine Grain Cross-VM Attacks on Xen and VMware , 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.
[246] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[247] Keisuke Tanaka,et al. Weakened Random Oracle Models with Target Prefix , 2018, SecITC.
[248] Mahabir Prasad Jhanwar,et al. A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme , 2009, Inscrypt.
[249] Konstantinos Demertzis,et al. Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem , 2018, ICETE.
[250] Jill Slay,et al. Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks , 2019, IEEE Transactions on Big Data.
[251] Alexandre Gazet,et al. Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.
[252] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[253] Brian Lee,et al. Comparative Study of Deep Learning Models for Network Intrusion Detection , 2018 .
[254] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[255] Howon Kim,et al. An Effective Intrusion Detection Classifier Using Long Short-Term Memory with Gradient Descent Optimization , 2017, 2017 International Conference on Platform Technology and Service (PlatCon).
[256] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[257] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[258] David Naccache,et al. Legally Fair Contract Signing Without Keystones , 2016, ACNS.
[259] Bart Preneel,et al. Proper RFID Privacy: Model and Protocols , 2014, IEEE Transactions on Mobile Computing.
[260] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[261] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[262] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[263] Detecting Lateral Movement through Tracking Event Logs , 2017 .
[264] Ronald Cramer,et al. Short Stickelberger Class Relations and Application to Ideal-SVP , 2016, EUROCRYPT.
[265] Ye Liu,et al. An image encryption scheme combining chaos with cycle operation for DNA sequences , 2016, Nonlinear Dynamics.
[266] Arini Balakrishnan,et al. Code Obfuscation Literature Survey , 2005 .
[267] Pablo Rodriguez,et al. Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS , 2015, Comput. Commun. Rev..
[268] Elaine Shi,et al. GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation , 2015, ASPLOS.
[269] Flavio D. Garcia,et al. LeiA: A Lightweight Authentication Protocol for CAN , 2016, ESORICS.
[270] Oscar Moreno,et al. McEliece public key cryptosystems using algebraic-geometric codes , 1996 .
[271] Eamonn J. Keogh,et al. A symbolic representation of time series, with implications for streaming algorithms , 2003, DMKD '03.
[272] Hao Chen,et al. Simple Encrypted Arithmetic Library - SEAL v2.1 , 2016, Financial Cryptography Workshops.
[273] Onur Mutlu,et al. The RowHammer problem and other issues we may face as memory becomes denser , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[274] Valérie Viet Triem Tong,et al. GroddDroid: a gorilla for triggering malicious behaviors , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[275] Mihai-Lica Pura,et al. Assuring Privacy in Surfing the Internet , 2018, SecITC.
[276] Vishal Saraswat,et al. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols , 2007, INDOCRYPT.
[277] Nathalie Japkowicz,et al. Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks , 2016, 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[278] Gilles Brassard,et al. Quantum cryptanalysis of hash and claw-free functions , 1997, SIGA.
[279] S. Halevi,et al. Design and Implementation of a Homomorphic-Encryption Library , 2012 .
[280] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[281] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[282] Jianfeng Wang,et al. Secure searchable encryption: a survey , 2016, Journal of Communications and Information Networks.
[283] Jantima Polpinij,et al. Content-Based Text Classifiers for Pornographic Web Filtering , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[284] Sylvia Ratnasamy,et al. BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.
[285] Benny Pinkas,et al. Fair Secure Two-Party Computation , 2003, EUROCRYPT.
[286] Marco Chiappetta,et al. Real time detection of cache-based side-channel attacks using hardware performance counters , 2016, Appl. Soft Comput..
[287] Michael Naehrig,et al. A Comparison of the Homomorphic Encryption Schemes FV and YASHE , 2014, AFRICACRYPT.
[288] Ihor Romanets,et al. High performance adaptive system for cyber attacks detection , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[289] Peter Schwabe,et al. SPHINCS: Practical Stateless Hash-Based Signatures , 2015, EUROCRYPT.
[290] Alptekin Küpçü,et al. Efficient Dynamic Searchable Encryption with Forward Privacy , 2017, Proc. Priv. Enhancing Technol..
[291] Patrik Jonsson,et al. LOGISTICS AND SUPPLY CHAIN MANAGEMENT , 2022 .
[292] Engin Kirda,et al. UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.
[293] Yehuda Lindell,et al. Complete Fairness in Secure Two-Party Computation , 2011, JACM.
[294] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[295] Shunsuke Inenaga,et al. On-Line Linear-Time Construction of Word Suffix Trees , 2006, CPM.
[296] Michael K. Reiter,et al. Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.
[297] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[298] Navdeep Jaitly,et al. Adversarial Autoencoders , 2015, ArXiv.
[299] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[300] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[301] Yong Tang,et al. A survey of malware behavior description and analysis , 2018, Frontiers Inf. Technol. Electron. Eng..
[302] Marilyn A. Brown,et al. Smart meter deployment in Europe: A comparative case study on the impacts of national policy schemes , 2017 .
[303] Arvind Narayanan,et al. Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .
[304] Collin Jackson,et al. Analyzing Forged SSL Certificates in the Wild , 2014, 2014 IEEE Symposium on Security and Privacy.
[305] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[306] Masoumeh Koochak Shooshtari,et al. Reducing the key length of mceliece cryptosystem using polar codes , 2014, 2014 11th International ISC Conference on Information Security and Cryptology.
[307] Tanja Lange,et al. Wild McEliece , 2010, IACR Cryptol. ePrint Arch..
[308] Naim Asaj,et al. Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[309] Shiguo Lian,et al. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..
[310] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[311] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[312] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[313] Jean-Charles Faugère,et al. Structural cryptanalysis of McEliece schemes with compact keys , 2016, Des. Codes Cryptogr..
[314] Gábor Ivanyos,et al. Quantum computation of discrete logarithms in semigroups , 2013, J. Math. Cryptol..
[315] Paul England,et al. Resource management for isolation enhanced cloud services , 2009, CCSW '09.
[316] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[317] Stefano Zanero,et al. HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.
[318] Cong Wang,et al. LightBox: SGX-assisted Secure Network Functions at Near-native Speed , 2017, ArXiv.
[319] Mamoun Filali,et al. An Alternative Definition for Timed Automata Composition , 2011, ATVA.
[320] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[321] Heejo Lee,et al. Detecting metamorphic malwares using code graphs , 2010, SAC '10.
[322] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[323] Ingrid Verbauwhede,et al. LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks , 2012, CANS.
[324] Xingyuan Wang,et al. Novel image encryption algorithm based on cycle shift and chaotic system , 2015 .
[325] Mikhail A. Borodin,et al. Effective attack on the McEliece cryptosystem based on Reed-Muller codes , 2014 .
[326] Sylvain Guilley,et al. An Easy-to-Design PUF Based on a Single Oscillator: The Loop PUF , 2012, 2012 15th Euromicro Conference on Digital System Design.
[327] Yassine Lemmou,et al. Inside GandCrab Ransomware , 2018, CANS.
[328] Kwang-Cheng Chen,et al. Information Fusion to Defend Intentional Attack in Internet of Things , 2014, IEEE Internet of Things Journal.
[329] Paulo S. L. M. Barreto,et al. MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes , 2013, 2013 IEEE International Symposium on Information Theory.
[330] Steven D. Galbraith,et al. Computing isogenies between supersingular elliptic curves over F_p , 2013 .
[331] Russ Housley,et al. An Internet Attribute Certificate Profile for Authorization , 2010, RFC.
[332] Ricardo Dahab,et al. Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers , 2015, SPACE.
[333] Jacques Klein,et al. AndroZoo: Collecting Millions of Android Apps for the Research Community , 2016, 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR).
[334] Sevil Sen,et al. A Survey of Intrusion Detection Systems Using Evolutionary Computation , 2015 .
[335] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[336] Daniel Smith-Tone,et al. Report on Post-Quantum Cryptography , 2016 .
[337] Ian Harris,et al. Detecting Phishing Attacks Using Natural Language Processing and Machine Learning , 2018, 2018 IEEE 12th International Conference on Semantic Computing (ICSC).
[338] Malcolm I. Heywood,et al. On botnet detection with genetic programming under streaming data, label budgets and class imbalance , 2017, Swarm Evol. Comput..
[339] Daisuke Suzuki,et al. The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes , 2010, CHES.
[340] Dong Hoon Lee,et al. VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System , 2018, IEEE Transactions on Information Forensics and Security.
[341] David J. Montana,et al. Strongly Typed Genetic Programming , 1995, Evolutionary Computation.
[342] Chunhua Su,et al. A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things , 2018, IEEE Access.
[343] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[344] Julio Hernandez-Castro,et al. Pitfalls in Ultralightweight Authentication Protocol Designs , 2016, IEEE Transactions on Mobile Computing.
[345] Stefan Katzenbeisser,et al. Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection , 2016, WPES@CCS.
[346] Abhishek Banerjee,et al. New and Improved Key-Homomorphic Pseudorandom Functions , 2014, CRYPTO.
[347] Suhaimi Ibrahim,et al. Camouflage in Malware: from Encryption to Metamorphism , 2012 .
[348] Jean-Pierre Tillich,et al. A new signature scheme based on (U|U+V) codes , 2017, IACR Cryptol. ePrint Arch..
[349] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[350] Christof Fetzer,et al. ShieldBox: Secure Middleboxes using Shielded Execution , 2018, SOSR.
[351] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[352] M. Ufuk Çaglayan,et al. Providing destructive privacy and scalability in RFID systems using PUFs , 2015, Ad Hoc Networks.
[353] Karthikeyan Bhargavan,et al. A Formal Treatment of Accountable Proxying Over TLS , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[354] S. Kanade,et al. Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[355] Benoit Feix,et al. Chicken or the Egg - Computational Data Attacks or Physical Attacks , 2015, IACR Cryptol. ePrint Arch..
[356] Stefanos Kaxiras,et al. Non deterministic caches: a simple and effective defense against side channel attacks , 2008, Des. Autom. Embed. Syst..
[357] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[358] Stark C. Draper,et al. Feature transformation of biometric templates for secure biometric systems based on error correcting codes , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[359] Heba F. Eid,et al. Hybrid Intelligent Intrusion Detection Scheme , 2011 .
[360] Robert Bosch,et al. Plug-and-Secure Communication for CAN , 2015 .
[361] Je-Won Kang,et al. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.
[362] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[363] R. S. Jadon,et al. Role of artificial intelligence in enterprise information security: A review , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).
[364] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[365] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[366] Sellami Ali,et al. DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .
[367] Christian Diedrich,et al. Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[368] Derek Bruening,et al. An infrastructure for adaptive dynamic optimization , 2003, International Symposium on Code Generation and Optimization, 2003. CGO 2003..
[369] David Lie,et al. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware , 2016, NDSS.
[370] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[371] John R. Koza,et al. Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.
[372] Bertrand Copigneaux. Semi-autonomous, context-aware, agent using behaviour modelling and reputation systems to authorize data operation in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[373] Kang G. Shin,et al. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.
[374] Hao Chen,et al. Attacks on Search RLWE , 2015, IACR Cryptol. ePrint Arch..
[375] Peng Li,et al. An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..
[376] Jemal H. Abawajy,et al. Identifying cyber threats to mobile-IoT applications in edge computing paradigm , 2018, Future Gener. Comput. Syst..
[377] Refik Molva,et al. Secure and Scalable Multi-User Searchable Encryption , 2018, IACR Cryptol. ePrint Arch..
[378] Manoj Prabhakaran,et al. Resource Fairness and Composability of Cryptographic Protocols , 2006, Journal of Cryptology.
[379] Yuansheng Liu,et al. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map , 2013, 1307.4279.
[380] Serge Vaudenay,et al. Mutual authentication in RFID: security and privacy , 2008, ASIACCS '08.
[381] Vlad Dragoi,et al. Algebraic approach for the study of algorithmic problems coming from cryptography and the theory of error correcting codes. (Approche algébrique pour l'étude et la résolution de problèmes algorithmiques issus de la cryptographie et de la théorie des codes ) , 2017 .
[382] Sergey Mashukov. Diameter Security: An Auditor's Viewpoint , 2017, J. ICT Stand..
[383] Mugurel Barcau,et al. Ring Homomorphic Encryption Schemes , 2018, IACR Cryptol. ePrint Arch..
[384] Yuval Elovici,et al. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection , 2018, NDSS.
[385] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[386] Ian T. Foster,et al. The Globus project: a status report , 1998, Proceedings Seventh Heterogeneous Computing Workshop (HCW'98).
[387] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[388] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[389] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[390] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[391] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[392] Ying Su,et al. A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations , 2008, IEEE Journal of Solid-State Circuits.
[393] Sarp Ertürk,et al. Are RNGs Achilles’ Heel of RFID Security and Privacy Protocols? , 2018, IACR Cryptol. ePrint Arch..
[394] Truong Son Pham,et al. Machine learning techniques for web intrusion detection — A comparison , 2016, 2016 Eighth International Conference on Knowledge and Systems Engineering (KSE).
[395] Hongyu Liu,et al. CNN and RNN based payload classification methods for attack detection , 2019, Knowl. Based Syst..
[396] Serge Vaudenay,et al. On Privacy Models for RFID , 2007, ASIACRYPT.
[397] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[398] Daniel J. Bernstein,et al. The Salsa20 Family of Stream Ciphers , 2008, The eSTREAM Finalists.
[399] Klaus Wagner,et al. Flush+Flush: A Fast and Stealthy Cache Attack , 2015, DIMVA.
[400] Mona Vij,et al. Snort Intrusion Detection System with Intel Software Guard Extension (Intel SGX) , 2018, ArXiv.
[401] Yilong Yin,et al. SDUMLA-HMT: A Multimodal Biometric Database , 2011, CCBR.
[402] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[403] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[404] Pierre Laperdrix. Browser Fingerprinting : Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures , 2017 .
[405] R. Fraser. The structure of deoxyribose nucleic acid. , 2004, Journal of structural biology.
[406] Jens Myrup Pedersen,et al. An approach for detection and family classification of malware based on behavioral analysis , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
[407] Sjouke Mauw,et al. FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting , 2015, ESORICS.
[408] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[409] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[410] Salvatore J. Stolfo,et al. When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.
[411] Yu-Long Qiao,et al. A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos , 2015, Entropy.
[412] Akhilesh Dwivedi,et al. Performance evaluation of rough set based classification models to intrusion detection system , 2016, 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Fall).
[413] Alexander May,et al. On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes , 2015, EUROCRYPT.
[414] Ahmad-Reza Sadeghi,et al. PUF-Enhanced RFID Security and Privacy , 2010 .
[415] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[416] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[417] Tero Kokkonen,et al. Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises , 2018, NEW2AN.
[418] Süleyman Kardas,et al. A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions , 2011, IACR Cryptol. ePrint Arch..
[419] David A. Basin,et al. The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.
[420] Ruby B. Lee,et al. Random Fill Cache Architecture , 2014, 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture.
[421] Ron Steinfeld,et al. Middle-Product Learning with Errors , 2017, CRYPTO.
[422] Peter L. Montgomery,et al. A Block Lanczos Algorithm for Finding Dependencies Over GF(2) , 1995, EUROCRYPT.
[423] María Naya-Plasencia,et al. An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography , 2017, ASIACRYPT.
[424] Arturo Ribagorda,et al. Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming , 2010, 2010 International Conference on Availability, Reliability and Security.
[425] Juan E. Tapiador,et al. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol , 2009, WISA.
[426] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[427] Yurong Liu,et al. A survey of deep neural network architectures and their applications , 2017, Neurocomputing.
[428] Iwen Coisel. Data Synchronization in Privacy-Preserving RFID Authentication Schemes , 2008 .
[429] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[430] R. Feynman. Simulating physics with computers , 1999 .
[431] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[432] Evgenios Konstantinou,et al. Metamorphic Virus: Analysis and Detection , 2008 .
[433] Sattar Mirzakuchaki,et al. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..
[434] Hiroki Takakura,et al. Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation , 2011, BADGERS '11.
[435] Kai Huang,et al. Intrusion Detection Using Convolutional Neural Networks for Representation Learning , 2017, ICONIP.
[436] Juan E. Tapiador,et al. Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming , 2009, EvoWorkshops.
[437] Werner Schindler,et al. Random Number Generators for Cryptographic Applications , 2009, Cryptographic Engineering.
[438] Nicolas Sendrier. Code-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.
[439] Valérie Viet Triem Tong,et al. GPFinder: Tracking the invisible in Android malware , 2017, 2017 12th International Conference on Malicious and Unwanted Software (MALWARE).
[440] Mohd Aizaini Maarof,et al. Malware behavior image for malware variant identification , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).
[441] K. R. Renjish Kumar,et al. International mobile data roaming: Managed or unmanaged? , 2010, CTTE.
[442] S. P. Shantharajah,et al. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms , 2015 .
[443] Frederik Armknecht,et al. Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts , 2014, RFIDSec.
[444] Xingyuan Wang,et al. A novel chaotic image encryption scheme using DNA sequence operations , 2015 .
[445] Carl Pomerance,et al. The Quadratic Sieve Factoring Algorithm , 1985, EUROCRYPT.
[446] Ahmad-Reza Sadeghi,et al. Enhancing RFID Security and Privacy by Physically Unclonable Functions , 2009, Towards Hardware-Intrinsic Security.
[447] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[448] Andrew M. Odlyzko,et al. Discrete Logarithms in Finite Fields and Their Cryptographic Significance , 1985, EUROCRYPT.
[449] Peter Herrmann,et al. Compositional Verification of Application-Level Security Properties , 2013, ESSoS.
[450] Frederik Vercauteren,et al. A New RFID Privacy Model , 2011, ESORICS.
[451] Steven Tuecke,et al. An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.
[452] Shi Guang Mu,et al. A Dynamic Malware Detection Approach by Mining the Frequency of API Calls , 2014, CIT 2014.
[453] Julian Francis Miller,et al. Cartesian genetic programming , 2000, GECCO '10.
[454] Albert Levi,et al. PUF-enhanced offline RFID security and privacy , 2012, J. Netw. Comput. Appl..
[455] James Hendricks,et al. Secure bootstrap is not enough: shoring up the trusted computing base , 2004, EW 11.
[456] Esko Ukkonen,et al. Constructing Suffix Trees On-Line in Linear Time , 1992, IFIP Congress.
[457] Samrat L. Sabat,et al. A fast chaotic block cipher for image encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..
[458] S. P. Choudhary,et al. A Simple Method for Detection of Metamorphic Malware using Dynamic Analysis and Text Mining , 2015 .
[459] Shai Halevi,et al. Bootstrapping for HElib , 2015, EUROCRYPT.
[460] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[461] Keisuke Tanaka,et al. Security of Encryption Schemes in Weakened Random Oracle Models , 2010, IACR Cryptol. ePrint Arch..
[462] Pong C. Yuen,et al. Binary Discriminant Analysis for Generating Binary Face Template , 2012, IEEE Transactions on Information Forensics and Security.
[463] Keiichi Iwamura,et al. Geometric group key-sharing scheme , 2016, 2016 IEEE 5th Global Conference on Consumer Electronics.
[464] Alain Couvreur,et al. Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes , 2013, Des. Codes Cryptogr..
[465] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, Journal of Cryptology.
[466] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[467] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[468] Claus-Peter Schnorr,et al. Lattice basis reduction: Improved practical algorithms and solving subset sum problems , 1991, FCT.
[469] Zoubin Ghahramani,et al. Combining active learning and semi-supervised learning using Gaussian fields and harmonic functions , 2003, ICML 2003.
[470] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[471] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[472] Jean-Sébastien Coron,et al. Optimal Security Proofs for PSS and Other Signature Schemes , 2002, EUROCRYPT.
[473] Nicolas Debande,et al. Profiled Model Based Power Simulator for Side Channel Evaluation , 2012, IACR Cryptol. ePrint Arch..
[474] Wil Michiels,et al. Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough , 2016, CHES.
[475] Yi Mu,et al. Jhanwar-Barua's Identity-Based Encryption Revisited , 2014, NSS.
[476] Serge Vaudenay,et al. The Security of DSA and ECDSA , 2003, Public Key Cryptography.
[477] Miklós Ajtai,et al. Generating hard instances of lattice problems (extended abstract) , 1996, STOC '96.
[478] Mohammad Teshnehlab,et al. An anomaly detection method to detect web attacks using Stacked Auto-Encoder , 2018, 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS).
[479] Nicolas Sendrier,et al. On the Dimension of the Hull , 1997, SIAM J. Discret. Math..
[480] Christian Wieschebrink. Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes , 2010, PQCrypto.
[481] Ingrid Verbauwhede,et al. CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus , 2011 .
[482] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[483] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[484] Gorka Irazoqui Apecechea,et al. Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud , 2015, IACR Cryptol. ePrint Arch..
[485] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[486] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[487] Sankardas Roy,et al. Deep Ground Truth Analysis of Current Android Malware , 2017, DIMVA.
[488] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[489] Peter Weiner,et al. Linear Pattern Matching Algorithms , 1973, SWAT.
[490] Moses D. Liskov. Constructing an Ideal Hash Function from Weak Ideal Compression Functions , 2006, Selected Areas in Cryptography.
[491] Ingrid Daubechies,et al. The wavelet transform, time-frequency localization and signal analysis , 1990, IEEE Trans. Inf. Theory.
[492] Marc Stevens,et al. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate , 2009, CRYPTO.
[493] Sylvia Ratnasamy,et al. SafeBricks: Shielding Network Functions in the Cloud , 2018, NSDI.
[494] Ghazi Al-Naymat,et al. Detecting Distributed Denial of Service Attacks Using Data Mining Techniques , 2016 .
[495] Arash Ghorbannia Delavar,et al. False Positives Reduction Techniques in Intrusion Detection Systems-A Review , 2013 .
[496] Georg Carle,et al. The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements , 2011, IMC '11.
[497] M. R. Warsi,et al. Domain Dictionary-Based Metadata Construction for Search Over Encrypted Cloud Data , 2018 .
[498] Fahimeh Farahnakian,et al. A deep auto-encoder based approach for intrusion detection system , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[499] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[500] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[501] Anupam Joshi,et al. OBD_SecureAlert: An Anomaly Detection System for Vehicles , 2016, 2016 IEEE International Conference on Smart Computing (SMARTCOMP).
[502] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[503] Vikram S. Adve,et al. Virtual ghost: protecting applications from hostile operating systems , 2014, ASPLOS.
[504] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[505] Marco Baldi,et al. Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes , 2007, 2007 IEEE International Symposium on Information Theory.
[506] Christopher Krügel,et al. Improving the efficiency of dynamic malware analysis , 2010, SAC '10.
[507] Yannick Seurin,et al. HB#: Increasing the Security and Efficiency of HB+ , 2008, EUROCRYPT.
[508] Leonard M. Adleman,et al. A Subexponential Algorithm for Discrete Logarithms over All Finite Fields , 1993, CRYPTO.
[509] Stefan Katzenbeisser,et al. Group homomorphic encryption: characterizations, impossibility results, and applications , 2013, Des. Codes Cryptogr..
[510] Juan del Cuvillo,et al. Using innovative instructions to create trustworthy software solutions , 2013, HASP '13.
[511] Yvonne O'Connor,et al. Privacy by Design: Informed Consent and Internet of Things for Smart Health , 2017, EUSPN/ICTH.
[512] Ian Oliver,et al. SMS and one-time-password interception in LTE networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[513] Gildas Avoine,et al. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols , 2010, RFIDSec.
[514] Gorka Irazoqui Apecechea,et al. S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES , 2015, 2015 IEEE Symposium on Security and Privacy.
[515] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[516] Ronald Cramer,et al. Recovering Short Generators of Principal Ideals in Cyclotomic Rings , 2016, EUROCRYPT.
[517] Edoardo Persichetti,et al. Compact McEliece keys based on quasi-dyadic Srivastava codes , 2012, J. Math. Cryptol..
[518] Kwok-Tung Lo,et al. Breaking a Chaotic Cryptographic Scheme Based on Composition Maps , 2009, Int. J. Bifurc. Chaos.
[519] Sylvain Guilley,et al. Formal Framework for the Evaluation of Waveform Resynchronization Algorithms , 2011, WISTP.
[520] Jantima Polpinij,et al. A web pornography patrol system by content-based analysis: In particular text and image , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.
[521] Jorge Guajardo,et al. Physical Layer Group Key Agreement for Automotive Controller Area Networks , 2016, CHES.
[522] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[523] John A. Clark,et al. Applying Cartesian Genetic Programming to Evolve Rules for Intrusion Detection System , 2018, IJCCI.
[524] Serge Vaudenay,et al. Hash-and-Sign with Weak Hashing Made Secure , 2007, ACISP.
[525] Marco Baldi,et al. A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes , 2008, SCN.
[526] Cristiana Santos,et al. Using Ontologies to Model Data Protection Requirements in Workflows , 2015, JSAI-isAI Workshops.
[527] Heejo Lee,et al. Obfuscated VBA Macro Detection Using Machine Learning , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[528] Raimo Kantola,et al. Roaming Interface Signaling Security for LTE Networks , 2018, SecITC.
[529] Bin Ma,et al. Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[530] Masahiro Yagisawa,et al. Fully Homomorphic Encryption without bootstrapping , 2015, IACR Cryptol. ePrint Arch..
[531] Jan Camenisch,et al. Optimistic Fair Secure Computation , 2000, CRYPTO.
[532] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[533] Sylvain Guilley,et al. Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem , 2018, Adv. Math. Commun..
[534] Chris Peikert,et al. Pseudorandomness of ring-LWE for any ring and modulus , 2017, STOC.
[535] Sylvain Guilley,et al. An Improved Analysis of Reliability and Entropy for Delay PUFs , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).
[536] Bogdan Groza,et al. Efficient Protocols for Secure Broadcast in Controller Area Networks , 2013, IEEE Transactions on Industrial Informatics.
[537] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[538] Jean-Charles Faugère,et al. Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form , 2014, ASIACRYPT.
[539] Maximilian Hofer,et al. Physical Unclonable Functions in Theory and Practice , 2012 .
[540] Heiner Stuckenschmidt,et al. Improving Ontology Matching Using Meta-level Learning , 2009, ESWC.
[541] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[542] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.