{"title":"Same Point Composable and Nonmalleable Obfuscated Point Functions","authors":"Peter Fenteany, Benjamin Fuller","doi":"10.1007/978-3-030-57878-7_7","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_7","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131311212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster-Based Anonymization of Knowledge Graphs","authors":"A. Hoang, B. Carminati, E. Ferrari","doi":"10.1007/978-3-030-57878-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_6","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality Evaluation of Cyber Threat Intelligence Feeds","authors":"H. Griffioen, Tim M. Booij, C. Doerr","doi":"10.1007/978-3-030-57878-7_14","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_14","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tran Thao Phuong, Y. Sawaya, Hoang-Quoc Nguyen-Son, A. Yamada, A. Kubota, Tran Van Sang, R. Yamaguchi
{"title":"Human Factors in Homograph Attack Recognition","authors":"Tran Thao Phuong, Y. Sawaya, Hoang-Quoc Nguyen-Son, A. Yamada, A. Kubota, Tran Van Sang, R. Yamaguchi","doi":"10.1007/978-3-030-57878-7_20","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_20","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134181974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode","authors":"Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida","doi":"10.1007/978-3-030-57808-4_5","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_5","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intae Kim, S. Hwang, W. Susilo, J. Baek, Jongkil Kim
{"title":"Efficient Anonymous Multi-group Broadcast Encryption","authors":"Intae Kim, S. Hwang, W. Susilo, J. Baek, Jongkil Kim","doi":"10.1007/978-3-030-57808-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_13","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Gennaro, David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, W. E. Skeith, Anastasiia Timashova
{"title":"Publicly Evaluatable Perceptual Hashing","authors":"R. Gennaro, David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, W. E. Skeith, Anastasiia Timashova","doi":"10.1007/978-3-030-57878-7_21","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_21","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122792527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption","authors":"Antonio Faonio, D. Fiore","doi":"10.1007/978-3-030-57808-4_14","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_14","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126978296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}