111 results on '"Conti, Mauro"'
Search Results
2. RedactBuster: Entity Type Recognition from Redacted Documents
3. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction
4. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
5. Acoustic Side-Channel Attacks on a Computer Mouse
6. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection
7. DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network
8. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
9. HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments
10. A Systematic Evaluation of Backdoor Attacks in Various Domains
11. HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments
12. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
13. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps
14. Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages
15. Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages
16. For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection
17. For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection
18. Tactics for Account Access Graphs
19. ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
20. Machine-Checked Proofs of Accountability: How to sElect Who is to Blame
21. n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi
22. stoRNA: Stateless Transparent Proofs of Storage-time
23. You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
24. Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing
25. Efficient Transparent Polynomial Commitments for zk-SNARKs
26. Syntax-Aware Mutation for Testing the Solidity Compiler
27. When is Slower Block Propagation More Profitable for Large Miners?
28. Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations
29. Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
30. Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition
31. MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack
32. Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
33. Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
34. Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks
35. Layered Symbolic Security Analysis in
36. A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
37. Reviving Meltdown 3a
38. Everlasting ROBOT: The Marvin Attack
39. The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
40. Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
41. JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications
42. Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication
43. Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
44. Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis
45. Password-Based Credentials with Security Against Server Compromise
46. Code-Based Secret Handshake Scheme, Revisited
47. Threshold Fully Homomorphic Encryption Over the Torus
48. Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
49. A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth
50. Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.