1
Detection of Intrusions and Malware, and Vulnerability Assessment [E-Book] : 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings /
Table of Contents: ...: An Analysis of Domain Impersonation in the Lower DNS Hierarchy -- Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device -- Refined Grey-Box Fuzzing with Sivo -- SCRUTINIZER: Detecting Code Reuse...

Full text 
2
Selected Areas in Cryptography [E-Book] : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers /
Table of Contents: ... Encodings in White-Box Implementations -- Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting -- High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.-....

Full text 
3
Quality, Reliability, Security and Robustness in Heterogeneous Systems [E-Book] : 17th EAI International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings /
Bao, Wei
2021
Table of Contents: ... Design -- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher -- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function -- Network Security 15 Topology Validator - Defense against Topology...

Full text 
4
Theory of Cryptography [E-Book] : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I /
Table of Contents: ... -- Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs -- Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness -- Tight Security Bounds for Micali's SNARGs -- Acyclicity Programming for Sigma-Protocols...

Full text 
5
Information Security [E-Book] : 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings /
Table of Contents: ...-Box Implementations of the SM4 Block Cipher -- A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic Data -- Bigdata-facilitated Two-party Authenticated Key Exchange for IoT -- Randomized Component Based Secure Secret...

Full text 
6
Progress in Cryptology - INDOCRYPT 2021 [E-Book] : 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings /
Table of Contents: ...'s Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against...

Full text 
7
Device-Independent Quantum Information Processing [E-Book] : A Simplified Analysis /
Table of Contents: ...Introduction -- Preliminaries: Basics and Notation -- Preliminaries: Device-independent Concepts -- Introduction to the Showcases -- Single-round Box -- Multi-round Box -- Working Under the IID Assumption -- Reductions to IID: Parallel Interaction...

Full text 
8
Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation [E-Book] /
9
Human Aspects of IT for the Aged Population. Applications, Services and Contexts [E-Book] : Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II /
Table of Contents: ... between Senior Communities with Telepresence Robots -- Reopening the Black Box of Career Age and Research Performance. - Intergenerational Techno-Creative Activities in a Library Fablab. - ‘Industrie 4.0’ and an Aging Workforce – A Discussion from a...

Full text 
10
Theory of Cryptography [E-Book] : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /
Table of Contents: ... Security Does Not Imply Indistinguishability Under Selective Opening -- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts -- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function -- Post...

Full text 
11
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
12
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
13
Cryptography and Information Security in the Balkans [E-Book] : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers /
Table of Contents: ... -- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm -- Cryptanalysis -- Analysis of the Authenticated Cipher MORUS -- Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes -- Time-Success Ratios under Simple Transformations...

Full text 
14
Passive and Active Measurement [E-Book] : 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings /
Table of Contents: ... Recommendation System Using Real User Monitoring Data -- Is The Web HTTP/2 Yet -- Modeling HTTP/2 Speed from HTTP/1 Traces -- Behind Box-Office Sales: Understanding Automation Spam in Online Classifieds -- Towards a Model of DNS Client Behavior -- Detecting DNS Root...

Full text 
15
Service-Oriented and Cloud Computing [E-Book] : 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedings /
Table of Contents: ...Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service -- vmBBThrPred: A Black-Box Throughput Predictor for Virtual Machines in Cloud Environments -- Dynamic SLAs for Clouds -- Reinforcement Learning Techniques...

Full text