


default search action
17th ICETE 2020: Paris, France - Volume 2
- Pierangela Samarati, Sabrina De Capitani di Vimercati, Mohammad S. Obaidat, Jalel Ben-Othman:

Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020. ScitePress 2020, ISBN 978-989-758-446-6
Invited Speakers
- Henderik A. Proper:

Enterprise Systems Architecture - Essentials. ICETE (1) 2020: 5-6 - Marta Botella-Campos, Sandra Viciano-Tudela, Sandra Sendra, Jaime Lloret:

Non-invasive Wireless Mobile System for COVID-19 Monitoring in Nursing Homes. ICETE (1) 2020: 7-16 - Ajith Abraham:

Industry 4.0: Challenges from a Data Science Perspective. ICETE (1) 2020: 17 - Moti Yung:

Secure Computation Protocol: A Technology for Our Time. ICETE (1) 2020: 19 - Ingemar Johansson Cox:

Analysing Digital Footprints to Infer the Health of Populations and Individuals. ICETE (1) 2020: 21
Papers
- Anne Borcherding

, Steffen Pfrang, Christian Haas, Albrecht Weiche, Jürgen Beyerer:
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems. 27-38 - Thomas Genet, Thomas P. Jensen, Justine Sauvage

:
Termination of Ethereum's Smart Contracts. 39-51 - George Stergiopoulos

, Eirini Lygerou, Nikolaos Tsalis, Dimitris Tomaras, Dimitris Gritzalis:
Avoiding Network and Host Detection using Packet Bit-masking. 52-63 - Michael Ekonde Sone:

FPGA-based McEliece Cryptosystem using Non-linear Convolutional Codes. 64-75 - Nicolas Aragon, Olivier Blazy, Neals Fournaise, Philippe Gaborit:

CROOT: Code-based Round-Optimal Oblivious Transfer. 76-85 - Oussama Trabelsi, Lilia Sfaxi, Riadh Robbana:

DCBC: A Distributed High-performance Block-Cipher Mode of Operation. 86-97 - Marco Anisetti, Claudio A. Ardagna

, Nicola Bena
, Ernesto Damiani:
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems. 98-109 - Hamza Hammami, Mohammad S. Obaidat, Sadok Ben Yahia

:
An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data. 110-117 - Yuechen Chen, Linru Zhang, Siu-Ming Yiu:

Decentralized Multi-Client Attribute Based Functional Encryption. 118-129 - Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Schulmann:

Optimal Transport Layer for Secure Computation. 130-141 - Paul Marillonnet

, Mikaël Ates, Maryline Laurent
, Nesrine Kaaniche
:
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures. 142-154 - Josselin Mignerey, Cyrille Mucchietto, Jean-Baptiste Orfila:

Ensuring the Integrity of Outsourced Web Scripts. 155-166 - Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini:

Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets. 167-179 - Chih-Chun Liu, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:

FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints. 180-191 - John Korniotakis, Panagiotis Papadopoulos, Evangelos P. Markatos:

Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes. 192-200 - Ferucio Laurentiu Tiplea, Alexandru Ionita, Anca-Maria Nica:

Practically Efficient Attribute-based Encryption for Compartmented Access Structures. 201-212 - Olivier Blazy, Laura Brouilhet, Céline Chevalier, Neals Fournaise:

Round-optimal Constant-size Blind Signatures. 213-224 - Nesrine Kaaniche

, Sana Belguith
, Maryline Laurent
, Ashish Gehani, Giovanni Russello:
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. 225-237 - Marco Baldi, Alessandro Barenghi

, Franco Chiaraluce, Gerardo Pelosi
, Paolo Santini
:
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems. 238-249 - Lukás Zobal, Dusan Kolár, Jakub Kroustek:

Exploring Current E-mail Cyber Threats using Authenticated SMTP Honeypot. 253-262 - Levent Demir, Mathieu Thiery, Vincent Roca, Jean-Michel Tenkes, Jean-Louis Roch:

Optimizing dm-crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-processors. 263-270 - Georg Bramm

, Julian Schütte:
cipherPath: Efficient Traversals over Homomorphically Encrypted Paths. 271-278 - Sandra Rasoamiaramanana, Marine Minier, Gilles Macario-Rat:

A White-Box Encryption Scheme using Physically Unclonable Functions. 279-286 - Peter Maynard, Kieran McLaughlin:

Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks. 287-294 - Jing Yao

, Yifeng Zheng, Cong Wang, Surya Nepal
:
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness. 295-301 - Cédric Herzog

, Valérie Viet Triem Tong, Pierre Wilke, Arnaud Van Straaten, Jean-Louis Lanet:
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures. 302-309 - Mohamad El Laz, Benjamin Grégoire, Tamara Rezk:

Security Analysis of ElGamal Implementations. 310-321 - Satoshi Obana, Maki Yoshida:

Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing. 322-329 - Emina Ahmetovic, Thomas Lenz, Christian Kollmann:

Signatures to Go: A Framework for Qualified PDF Signing on Mobile Devices. 330-339 - Sigurd Eskeland:

Privacy-Preserving Greater-Than Integer Comparison without Binary Decomposition. 340-348 - Majid Mollaeefar, Alberto Siena, Silvio Ranise:

Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection. 349-356 - Hamza Hammami, Mohammad S. Obaidat, Sadok Ben Yahia

:
A Novel Anonymous Authentication and Key Agreement Scheme for Smart Grid. 357-362 - Bojan Spasic

, Olivier Markowitch, Philippe Thiran:
SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor Networks. 363-371 - Pascal Lafourcade, Léo Robert, Demba Sow

:
Linear Generalized ElGamal Encryption Scheme. 372-379 - Shabnam Khanna, Ciara Rafferty:

Accelerating Homomorphic Encryption using Approximate Computing Techniques. 380-387 - Alexander Marsalek, Edona Fasllija, Dominik Ziegler

:
This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining. 388-396 - Beyza Bozdemir, Orhan Ermis, Melek Önen:

ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications. 397-404 - Nathanaël Denis, Pierre Chaffardon, Denis Conan

, Maryline Laurent
, Sophie Chabridon
, Jean Leneutre:
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting. 405-414 - Julián Salas, Vicenç Torra

:
Differentially Private Graph Publishing and Randomized Response for Collaborative Filtering. 415-422 - Hossein Shirazi, Landon Zweigle, Indrakshi Ray:

A Machine-learning based Unbiased Phishing Detection Approach. 423-430 - Marius Schlegel

, Peter Amthor:
Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies. 431-442 - Louis Tajan, Dirk Westhoff, Frederik Armknecht

:
Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private. 443-450 - M. A. Haytom, Christophe Rosenberger

, Christophe Charrier
, C. Zhu, C. Regnier:
Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric System. 451-458 - Mohamed Nassar

, Elie Chicha, Bechara al Bouna, Richard Chbeir:
VIP Blowfish Privacy in Communication Graphs. 459-467 - Przemyslaw Blaskiewicz, Marek Klonowski, Piotr Syga

:
Droppix: Towards More Realistic Video Fingerprinting. 468-476 - Luís Fiolhais, Paulo Martins, Leonel Sousa:

Software Emulation of Quantum Resistant Trusted Platform Modules. 477-484 - Shoukat Ali, Koray Karabina, Emrah Karagoz:

Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation. 485-496 - Gamze Tillem, Beyza Bozdemir, Melek Önen:

SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network Predictions. 497-504 - Harry Halpin:

Deconstructing the Decentralization Trilemma. 505-512 - Peter Amthor, Marius Schlegel

:
Towards Language Support for Model-based Security Policy Engineering. 513-521 - Marius Schlegel

, Winfried E. Kühnhauser:
Exploiting Hot Spots in Heuristic Safety Analysis of Dynamic Access Control Models. 522-532 - Nishant Raj, Alwyn Roshan Pais:

CP-ABE Scheme Satisfying Constant-size Keys based on ECC. 535-540 - Puneet Bakshi, Sukumar Nandi:

Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption. 541-546 - Dominik Ziegler

, Alexander Marsalek, Bernd Prünster
, Josef Sabongui:
Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption. 547-552 - Yi-Fan Tseng, Zi-Yuan Liu

, Raylin Tso:
Practical Predicate Encryption for Inner Product. 553-558 - Elías Grande, Marta Beltrán

:
Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices. 559-564 - Christian Tietz, Eric Klieme, Rachel Brabender, Teresa Lasarow, Lukas Rambold, Christoph Meinel:

Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room Entry. 565-571 - Junade Ali, Vladimir Dyo

:
Practical Hash-based Anonymity for MAC Addresses. 572-579 - Lamine Aouad, Muhammad Rizwan Asghar

:
Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment. 580-586 - Thomas Lorünser

, Florian Wohner:
Performance Comparison of Two Generic MPC-frameworks with Symmetric Ciphers. 587-594 - Marco Valzelli, Andrea Maurino, Matteo Palmonari:

A Fine-grained Access Control Model for Knowledge Graphs. 595-601 - Haotian Weng, Artem Lenskiy

:
A Trend-following Trading Indicator on Homomorphically Encrypted Data. 602-607 - Sana Belguith

, Muhammad Rizwan Asghar
, Song Wang, Karina Mabell Gomez, Giovanni Russello:
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks. 608-617 - Zsolt Tujner, Thomas Rooijakkers, Maran van Heesch, Melek Önen:

QSOR: Quantum-safe Onion Routing. 618-624 - Oana Stan

, Loïc Cudennec
, Louis Syoën:
Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory. 625-631 - Christophe Nègre:

Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure. 632-637 - Abubakar-Sadiq Shehu, António Pinto

, Manuel Eduardo Correia
:
Providing Secured Access Delegation in Identity Management Systems. 638-644 - Arnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou

, Christos Ilioudis
:
An Innovative Self-Healing Approach with STIX Data Utilisation. 645-651 - Sondes Ksibi, Faouzi Jaïdi

, Adel Bouhoula
:
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems. 652-657

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














