Accepted Papers


  • Mohamad Mansouri, Beyza Bozdemir, Melek Önen and Orhan Ermis. PAC: Privacy-preserving Arrhythmia Classification with neural networks
  • Routa Moussaileb, Nora Cuppens-Boulahia, Jean-Louis Lanet and Hélène Le Bouder. Ransomware Network Traffic Analysis for Pre-Encryption Alert
  • Silvio Ranise, Giada Sciarretta and Alessandro Tomasi. Enroll, and authentication will follow: eID-based enrollment for a customized, secure, and frictionless authentication experience
  • William Briguglio and Sherif Saad. Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis
  • Guang Gong and Meng Yang. Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS
  • Peter Amthor and Martin Rabe. Command Dependencies in Heuristic Safety Analysis of Access Control Models
  • Maël Nogues, Hanan Hindy, David Brosset, Xavier Bellekens and Yvon Kermarrec. Labelled Network Capture Generation For Anomaly Detection
  • Guang Gong, Morgan He, Raghvendra Rohit and Yunjie Yi. U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme
  • Edoukou Berenger Ayebie, Hafsa Assidi and El Mamoun Souidi. An Efficient Identification Scheme Based on Rank Metric: RankId
  • Simon Tanner, Ilian Vogels and Roger Wattenhofer. Protecting Android Apps From Repackaging Using Native Code
  • Pascal Lafourcade, Mike Nopere, Jérémy Picot, Daniela Pizzuti and Etienne Roudeix. Security Analysis of Auctionity: a blockchain based e-auction
  • Charles Morisset, Sowmya Ravidas and Nicola Zannone. On Attribute Retrieval in ABAC
  • Hossein Shirazi, Indrakshi Ray and Charles Anderson. Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles
  • Sepideh Avizheh, Reihaneh Safavi-Naini and Shuai Li. Secure Logging with Security against Adaptive Crash Attack
  • Bruno Reis, Eva Maia and Isabel Praça. Selection and performance analysis of CICIDS2017 features importance
  • Daniel Servos and Michael Bauer. Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control
  • Nadjate Saidani, Kamel Adi and Mohand Said Allili.  Semantic-based efficient spam detection
  • Johannes Blömer and Nils Löken. Dynamic Searchable Encryption with Access Control
  • Davy Preuveneers and Wouter Joosen. TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE


Short Papers

  • Marius Lombard-Platet and Pascal Lafourcade.  Get-your-ID: Decentralized Proof of Identity
  • David Gerault and Pascal Lafourcade. Towards secure TMIS protocols
  • Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame and Sherif Saad Ahmed. Detecting Ransomware in Encrypted Web Traffic
  • Kambiz Ghazinour and Emil Shirima. Towards Privacy-Aware Smart Surveillance
  • Kambiz Ghazinour, Muhammad Muhzary and Srikanth Tadisetty. A Privacy Protection Layer for Wearable Devices
  • Hakuei Sugimoto, Ryota Hatano, Natsu Shoji and Kazuo Sakiyama. Validating the DFA Attack Resistance of AES
  • Lalia Saoudi, Kamel Adi and Youness Boudraa. A rejection-based approach for detecting SQL injection vulnerabilities in Web applications
  • Mohammed Alshahrani, Issa Traore and Sherif Saad.  Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History
  • Alessandro Cantelli-Forti and Michele Colajanni. Digital forensics in vessel transportation systems

Online user: 1