


default search action
18th STM 2022: Copenhagen, Denmark
- Gabriele Lenzini

, Weizhi Meng
:
Security and Trust Management - 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings. Lecture Notes in Computer Science 13867, Springer 2023, ISBN 978-3-031-29503-4
Security and Authentication
- Chris Hicks, Vasilios Mavroudis

, Jon Crowcroft:
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries. 3-23 - Yanmin Zhao, Yang Wang, Siu Ming Yiu, Yu Liu, Meiqin Wang:

A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions. 24-51 - Pascal Oser

, Felix Engelmann
, Stefan Lüders
, Frank Kargl
:
Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices. 52-70 - Johanna Maria Kirss, Peeter Laud, Nikita Snetkov

, Jelizaveta Vakarjuk
:
Server-Supported Decryption for Mobile Devices. 71-81
Deep Learning for Security and Trust
- Xin Zhou, Rakesh M. Verma

:
Software Vulnerability Detection via Multimodal Deep Learning. 85-103 - Giacomo Iadarola

, Francesco Mercaldo
, Fabio Martinelli, Antonella Santone:
Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps. 104-114
Data Analysis of Security and Trust
- Florimond Houssiau, Vincent Schellekens, Antoine Chatalic, Shreyas Kumar Annamraju, Yves-Alexandre de Montjoye:

M2M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch. 117-135 - Luca Buccioli

, Stefano Cristalli
, Edoardo Vignati
, Lorenzo Nava
, Daniele Badagliacca
, Danilo Bruschi, Long Lu, Andrea Lanzi
:
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language. 136-155 - Pan Wang, Zeyi Li, Xiaokang Zhou, Chunhua Su, Weizheng Wang:

FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection. 156-174
Trust and Security
- Marietjie Botes

:
The Relevance of Consent in the Digital Age: A Consideration of Its Origins and Its Fit for Digital Application. 177-188 - Fangyi Yu

, Miguel Vargas Martin
:
HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks. 189-198

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














