Search

Your search keyword '"CONTI, MAURO"' showing total 31 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Journal applied cryptography and network security workshops : acns 2020 satellite workshops, aiblock, aihws, aiots, cloud s&p, sci, secmt, and simla, rome, italy, october 19-22, 2020, proceedings Remove constraint Journal: applied cryptography and network security workshops : acns 2020 satellite workshops, aiblock, aihws, aiots, cloud s&p, sci, secmt, and simla, rome, italy, october 19-22, 2020, proceedings
31 results on '"CONTI, MAURO"'

Search Results

1. On the Verification of Signed Messages

2. Applications and Developments of the Lattice Attack in Side Channel Attacks

3. Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density Matching

4. Minority Reports Defense: Defending Against Adversarial Patches

5. On the Evolution of Security Issues in Android App Versions

6. MobHide: App-Level Runtime Data Anonymization on Mobile

7. DaVinci: Android App Analysis Beyond Frida via Dynamic System Call Instrumentation

8. Evaluation of the Adoption and Privacy Risks of Google Prompts

9. Exploring the Security of Certificate Transparency in the Wild

10. Towards Inclusive Privacy Protections in the Cloud

11. Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions

12. Proofs of Ownership on Encrypted Cloud Data via Intel SGX

13. On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation

14. A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

15. Computing Neural Networks with Homomorphic Encryption and Verifiable Computing

16. ARM-AFL: Coverage-Guided Fuzzing Framework for ARM-Based IoT Devices

17. Attribute-Based Symmetric Searchable Encryption

18. Post-exploitation and Persistence Techniques Against Programmable Logic Controller

19. Investigation of Cyber Attacks on a Water Distribution System

20. Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis

21. Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics

22. A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis

23. Leakage Assessment Through Neural Estimation of the Mutual Information

24. Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm

25. Tokenization of Real Estate Using Blockchain Technology

26. The Forgotten Hyperparameter : Introducing Dilated Convolution for Boosting CNN-Based Side-Channel Attacks

27. Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains

28. Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks

29. Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency Protocol

30. Evolvable Hardware Architectures on FPGA for Side-Channel Security

31. Bitcoin Blockchain Steganographic Analysis

Catalog

Books, media, physical & digital resources