Все публикации

2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely

Linear-Complexity Private Function Evaluation is Practical

Interpretable Probabilistic Password Strength Meters via Deep Learning

CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks

A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with PDPKS

A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing

PGC: Decentralized Confidential Payment System with Auditability

Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration S…

Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS…

Signatures with Tight Multi-user Security from Search Assumptions

Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation

Certifying Decision Trees Against Evasion Attacks by Program Analysis

Updatable Blockchains

Securing DNSSEC Keys via Threshold ECDSA from Generic MPC

MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation

Keynote: Accountability in computing

Keynote: Lattices and zero-knowledge

Keynote: Decentralising information and communications technology

ESORICS 2020 awards

Post-Quantum Adaptor Signatures and Payment Channel Networks

Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE

An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference

Detection by Attack: Detecting Adversarial Samples by Undercover Attack

Deduplication-Friendly Watermarking for Multimedia Data in Public Cloud

join shbcf.ru