Ausgabe 5/2022
Inhalt (14 Artikel)
Efficient verifiable computation over quotient polynomial rings
Jai Hyun Park, Jung Hee Cheon, Dongwoo Kim
IntentAuth: Securing Android’s Intent-based inter-process communication
Christos Lyvas, Costas Lambrinoudakis, Dimitris Geneiatakis
A Digital Asset Inheritance Model to Convey Online Persona Posthumously
Ram Govind Singh, Ananya Shrivastava, Sushmita Ruj
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”
Ilyes Ahmim, Nacira Ghoualmi-Zine, Ahmed Ahmim, Marwa Ahmim
Algorithm substitution attacks against receivers
Marcel Armour, Bertram Poettering
ANS-based compression and encryption with 128-bit security
Seyit Camtepe, Jarek Duda, Arash Mahboubi, Paweł Morawiecki, Surya Nepal, Marcin Pawłowski, Josef Pieprzyk
Highly private blockchain-based management system for digital COVID-19 certificates
Rosa Pericàs-Gornals, Macià Mut-Puigserver, M. Magdalena Payeras-Capellà
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats
Vasileios Vlachos, Yannis C. Stamatiou, Pantelis Tzamalis, Sotiris Nikoletseas
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries
Beyza Cevik, Nur Altiparmak, Murat Aksu, Sevil Sen
Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls
Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito
An anonymous and unlinkable electronic toll collection system
Ricard Borges, Francesc Sebé, Magda Valls
A survey on interest packet flooding attacks and its countermeasures in named data networking
Rabari Jeet, P. Arun Raj Kumar
Classifying resilience approaches for protecting smart grids against cyber threats
Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou