会议文集


文集名Applied Cryptography and Network Security
会议名22nd International Conference on Applied Cryptography and Network Security (ACNS 2024)
中译名《第二十二届国际应用密码学与网络安全会议,卷3》
会议日期March 5-8, 2024
会议地点Abu Dhabi, United Arab Emirates
出版年2024
馆藏号351873


题名作者出版年
Mirrored Commitment: Fixing "Randomized Partial Checking" and ApplicationsPawel Lorek; Moti Yung; Filip Zagorski2024
Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor SignaturesSiavash Riahi; Orfeas Stefanos Thyfronitis Litos2024
Programmable Payment ChannelsRanjit Kumaresan; Duc V. Le; Mohsen Minaei; Srinivasan Raghuraman; Yibin Yang; Mahdi Zamani2024
Fair Private Set Intersection Using Smart ContractsSepideh Avizheh; Reihaneh Safavi-Naini2024
Powers-of-Tau to the People: Decentralizing Setup CeremoniesValeria Nikolaenko; Sam Ragsdale; Joseph Bonneau; Dan Boneh2024
Self-sovereign Identity for Electric Vehicle ChargingAdrian Kailus; Dustin Kern; Christoph Krauss2024
"Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering InfrastructureSoumyadyuti Ghosh; Manaar Alam; Soumyajit Dey; Debdeep Mukhopadhyay2024
Security Analysis of BigBlueButton and eduMEETNico Heitmann; Hendrik Siewert; Sven Moog; Juraj Somorovsky2024
An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software ObfuscationNaiqian Zhang; Zheyun Feng; Dongpeng Xu2024
ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud SecurityKunal Mukherjee; Joshua Wiedemeier; Qi Wang; Junpei Kamimura; John Junghwan Rhee; James Wei; Zhichun Li; Xiao Yu; Lu-An Tang; Jiaping Gui; Kangkook Jee2024
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using RowhammerPuja Mondal; Suparna Kundu; Sarani Bhattacharya; Angshuman Karmakar; Ingrid Verbauwhede2024
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber ImplementationRuize Wang; Martin Brisfors; Elena Dubrova2024
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit ConstructionsMohammad Hashemi; Domenic Forte; Fatemeh Ganji2024
Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48Yunxue Lin; Ling Sun2024
How Users Investigate Phishing Emails that Lack Traditional Phishing CuesDaniel Kohler; Wenzel Punter; Christoph Meinel2024
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and GesturesH. T. M. A. Riyadh; Divyanshu Bhardwaj; Adrian Dabrowski; Katharina Krombholz2024
Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile AppsXianbo Wang; Kaixuan Luo; Wing Cheong Lau2024