What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Elisa Bertino
Google Scholar
116
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
P2C2T: Preserving the Privacy of Cross-Chain Transfer.
Panpan Han
Zheng Yan
Laurence T. Yang
Elisa Bertino
2025
conf/ndss
Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples.
Adrian Shuai Li
Arun Iyengar
Ashish Kundu
Elisa Bertino
2025
conf/wisec
Standing Firm in 5G: A Single-Round, Dropout-Resilient Secure Aggregation for Federated Learning.
Yiwei Zhang
Rouzbeh Behnia
Imtiaz Karim
Attila A. Yavuz
Elisa Bertino
2025
conf/uss
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication.
Yang Yang
Guomin Yang
Yingjiu Li
Minming Huang
Zilin Shen
Imtiaz Karim
Ralf Sasse
David A. Basin
Elisa Bertino
Jian Weng
HweeHwa Pang
Robert H. Deng
2025
conf/uss
Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks.
Kazi Samin Mubasshir
Imtiaz Karim
Elisa Bertino
2024
journals/compsec
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation.
Sonam Bhardwaj
Adrian Shuai Li
Mayank Dave
Elisa Bertino
2024
journals/tifs
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
Ruidong Han
Huihui Gong
Siqi Ma
Juanru Li
Chang Xu
Elisa Bertino
Surya Nepal
Zhuo Ma
Jianfeng Ma
2024
conf/uss
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications.
Mirza Masfiqur Rahman
Imtiaz Karim
Elisa Bertino
2024
conf/sp
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge.
Jiahe Lan
Jie Wang
Baochen Yan
Zheng Yan
Elisa Bertino
2024
conf/asiaccs
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode.
Zilin Shen
Imtiaz Karim
Elisa Bertino
2024
conf/ndss
Sharing cyber threat intelligence: Does it really help?
Beomjin Jin
Eunsoo Kim
Hyunwoo Lee
Elisa Bertino
Doowon Kim
Hyoungshick Kim
2023
conf/uss
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.
Xing Han
Yuheng Zhang
Xue Zhang
Zeyuan Chen
Mingzhe Wang
Yiwei Zhang
Siqi Ma
Yu Yu
Elisa Bertino
Juanru Li
2023
conf/sp
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.
Imtiaz Karim
Abdullah Al Ishtiaq
Syed Rafiul Hussain
Elisa Bertino
2023
conf/esorics
Towards Efficient Privacy-Preserving Deep Packet Inspection.
Weicheng Wang
Hyunwoo Lee
Yan Huang
Elisa Bertino
Ninghui Li
2022
journals/compsec
SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities.
Abubakar Sadiq Sani
Elisa Bertino
Dong Yuan
Ke Meng
Zhao Yang Dong
2022
journals/tifs
Compact Provenance Scheme Through Packet Path Index Differences in WSNs.
Qinbao Xu
Elisa Bertino
Changda Wang
2022
conf/uss
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models.
Shagufta Mehnaz
Sayanton V. Dibbo
Ehsanul Kabir
Ninghui Li
Elisa Bertino
2022
conf/sp
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Yunlong Lyu
Yi Fang
Yiwei Zhang
Qibin Sun
Siqi Ma
Elisa Bertino
Kangjie Lu
Juanru Li
2022
conf/esorics
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.
Hyunwoo Lee
Anand Mudgerikar
Ashish Kundu
Ninghui Li
Elisa Bertino
2022
conf/asiaccs
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol.
Hyunwoo Lee
Imtiaz Karim
Ninghui Li
Elisa Bertino
2022
conf/dsn
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications.
Yiwei Zhang
Siqi Ma
Juanru Li
Dawu Gu
Elisa Bertino
2021
conf/ccs
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Syed Rafiul Hussain
Imtiaz Karim
Abdullah Al Ishtiaq
Omar Chowdhury
Elisa Bertino
2021
conf/asiaccs
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Ankush Singla
Rouzbeh Behnia
Syed Rafiul Hussain
Attila A. Yavuz
Elisa Bertino
2021
conf/acsac
Crypto-Chain: A Relay Resilience Framework for Smart Vehicles.
Abubakar Sadiq Sani
Dong Yuan
Elisa Bertino
Zhao Yang Dong
2020
journals/popets
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Ankush Singla
Syed Rafiul Hussain
Omar Chowdhury
Elisa Bertino
Ninghui Li
2020
conf/ccs
Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation.
Ankush Singla
Elisa Bertino
Dinesh C. Verma
2020
conf/esorics
Polisma - A Framework for Learning Attribute-Based Access Control Policies.
Amani Abu Jabal
Elisa Bertino
Jorge Lobo
Mark Law
Alessandra Russo
Seraphin B. Calo
Dinesh C. Verma
2020
conf/acsac
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Siqi Ma
Hehao Li
Wenbo Yang
Juanru Li
Surya Nepal
Elisa Bertino
2020
conf/wisec
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy.
Weicheng Wang
Fabrizio Cicala
Syed Rafiul Hussain
Elisa Bertino
Ninghui Li
2019
journals/compsec
A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration.
Daren Fadolalkarim
Elisa Bertino
2019
journals/tifs
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet.
Abubakar Sadiq Sani
Dong Yuan
Wei Bao
Zhao Yang Dong
Branka Vucetic
Elisa Bertino
2019
conf/ccs
E-Spion: A System-Level Intrusion Detection System for IoT Devices.
Anand Mudgerikar
Puneet Sharma
Elisa Bertino
2019
conf/ccs
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Syed Rafiul Hussain
Mitziu Echeverria
Imtiaz Karim
Omar Chowdhury
Elisa Bertino
2019
conf/esorics
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.
Xun Yi
Kwok-Yan Lam
Elisa Bertino
Fang-Yu Rao
2019
conf/esorics
Finding Flaws from Password Authentication Code in Android Apps.
Siqi Ma
Elisa Bertino
Surya Nepal
Juanru Li
Diethelm Ostry
Robert H. Deng
Sanjay Jha
2019
conf/ndss
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Syed Rafiul Hussain
Mitziu Echeverria
Omar Chowdhury
Ninghui Li
Elisa Bertino
2019
conf/acsac
An empirical study of SMS one-time password authentication in Android apps.
Siqi Ma
Runhan Feng
Juanru Li
Yang Liu
Surya Nepal
Diethelm Ostry
Elisa Bertino
Robert H. Deng
Zhuo Ma
Sanjay Jha
2019
conf/acsac
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Imtiaz Karim
Fabrizio Cicala
Syed Rafiul Hussain
Omar Chowdhury
Elisa Bertino
2019
conf/wisec
Insecure connection bootstrapping in cellular networks: the root of all evil.
Syed Rafiul Hussain
Mitziu Echeverria
Ankush Singla
Omar Chowdhury
Elisa Bertino
2018
journals/compsec
A context-aware system to secure enterprise content: Incorporating reliability specifiers.
Oyindamola Oluwatimi
Maria Luisa Damiani
Elisa Bertino
2018
journals/compsec
Editorial: Security and privacy protection vs sustainable development.
Elisa Bertino
Valentina Casola
Aniello Castiglione
Willy Susilo
2018
journals/tifs
Android User Privacy Preserving Through Crowdsourcing.
Bahman Rashidi
Carol J. Fung
Anh Nguyen
Tam Vu
Elisa Bertino
2018
journals/tifs
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones.
Hasini Gunasinghe
Elisa Bertino
2018
conf/esorics
Self-Generating Policies for Machine Learning in Coalition Environments.
Dinesh C. Verma
Seraphin B. Calo
Shonda Witherspoon
Irene Manotas
Elisa Bertino
Amani M. Abu Jabal
Greg Cirincione
Ananthram Swami
Gavin Pearson
Geeth de Mel
2018
conf/esorics
Techniques and Systems for Anomaly Detection in Database Systems.
Asmaa Sallam
Elisa Bertino
2018
conf/esorics
AGENP: An ASGrammar-based GENerative Policy Framework.
Seraphin B. Calo
Irene Manotas
Geeth de Mel
Daniel Cunnington
Mark Law
Dinesh C. Verma
Alessandra Russo
Elisa Bertino
2018
conf/esorics
Can N-Version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation.
Sorin Adam Matei
Elisa Bertino
2018
conf/ndss
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Syed Rafiul Hussain
Omar Chowdhury
Shagufta Mehnaz
Elisa Bertino
2017
journals/compsec
Android resource usage risk assessment using hidden Markov model and online learning.
Bahman Rashidi
Carol J. Fung
Elisa Bertino
2017
journals/compsec
Extending social networks with delegation.
Adnan Ahmad
Brian Whitworth
Furkh Zeshan
Elisa Bertino
Robert S. Friedman
2017
journals/tifs
A Collaborative DDoS Defence Framework Using Network Function Virtualization.
Bahman Rashidi
Carol J. Fung
Elisa Bertino
2017
journals/tifs
Real-Time Digital Signatures for Time-Critical Networks.
Attila Altay Yavuz
Anand Mudgerikar
Ankush Singla
Ioannis Papapanagiotou
Elisa Bertino
2017
conf/ccs
MIST 2017: 9th International Workshop on Managing Insider Security Threats.
Ilsun You
Elisa Bertino
2017
conf/ccs
Memory Safety for Embedded Devices with nesCheck.
Daniele Midi
Mathias Payer
Elisa Bertino
2017
conf/ccs
CCS 2017: Women in Cyber Security (CyberW) Workshop.
Danfeng (Daphne) Yao
Elisa Bertino
2017
conf/esorics
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios.
Antonino Rullo
Edoardo Serra
Elisa Bertino
Jorge Lobo
2016
journals/istr
Editorial of special issue on security and privacy in cloud computing.
Feng Hao
Xun Yi
Elisa Bertino
2016
journals/tifs
Private Cell Retrieval From Data Warehouses.
Xun Yi
Russell Paulet
Elisa Bertino
Guandong Xu
2016
conf/ccs
Inside Attack Filtering for Robust Sensor Localization.
Jongho Won
Elisa Bertino
2016
conf/ccs
MIST 2016: 8th International Workshop on Managing Insider Security Threats.
Ilsun You
Elisa Bertino
2015
journals/tifs
Interdependent Security Risk Analysis of Hosts and Flows.
Mohsen Rezvani
Verica Sekulic
Aleksandar Ignjatovic
Elisa Bertino
Sanjay K. Jha
2015
journals/tifs
Effective Key Management in Dynamic Wireless Sensor Networks.
Seung-Hyun Seo
Jongho Won
Salmin Sultana
Elisa Bertino
2015
journals/tifs
Privacy-Preserving Detection of Sensitive Data Exposure.
Xiaokui Shu
Danfeng Yao
Elisa Bertino
2015
conf/ccs
MIST 2015: 7th International Workshop on Managing Insider Security Threats.
Ilsun You
Elisa Bertino
2015
conf/ccs
Privacy-Preserving Association Rule Mining in Cloud Computing.
Xun Yi
Fang-Yu Rao
Elisa Bertino
Athman Bouguettaya
2015
conf/ccs
A Secure Communication Protocol for Drones and Smart Objects.
Jongho Won
Seung-Hyun Seo
Elisa Bertino
2014
journals/compsec
A formal proximity model for RBAC systems.
Aditi Gupta
Michael S. Kirkpatrick
Elisa Bertino
2014
journals/compsec
Representation and querying of unfair evaluations in social rating systems.
Mohammad Allahbakhsh
Aleksandar Ignjatovic
Boualem Benatallah
Amin Beheshti
Norman Foo
Elisa Bertino
2014
conf/ccs
Privacy of outsourced k-means clustering.
Dongxi Liu
Elisa Bertino
Xun Yi
2014
conf/ccs
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs.
Asmaa Sallam
Elisa Bertino
2014
conf/ccs
Demo Overview: Privacy-Enhancing Features of IdentiDroid.
Daniele Midi
Oyindamola Oluwatimi
Bilal Shebaro
Elisa Bertino
2014
conf/esorics
ID-Based Two-Server Password-Authenticated Key Exchange.
Xun Yi
Feng Hao
Elisa Bertino
2014
conf/esorics
Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data.
Bharath Kumar Samanthula
Wei Jiang
Elisa Bertino
2014
conf/esorics
Data Trustworthiness - Approaches and Research Challenges.
Elisa Bertino
2013
journals/tifs
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
Omar Hasan
Lionel Brunie
Elisa Bertino
Ning Shang
2013
conf/ccs
Performance signatures of mobile phone browsers.
Bilal Shebaro
Di Jin
Elisa Bertino
2013
conf/ccs
Data quality evaluation: integrating security and accuracy.
Leon Reznik
Elisa Bertino
2013
conf/cns
A secure architecture design based on application isolation, code minimization and randomization.
Aditi Gupta
Michael S. Kirkpatrick
Elisa Bertino
2012
journals/compsec
Preserving privacy of feedback providers in decentralized reputation systems.
Omar Hasan
Lionel Brunie
Elisa Bertino
2012
conf/ccs
Demonstrating a lightweight data provenance for sensor networks.
Bilal Shebaro
Salmin Sultana
Shakthidhar Reddy Gopavaram
Elisa Bertino
2012
conf/ccs
Marlin: making it harder to fish for gadgets.
Aditi Gupta
Sam Kerr
Michael S. Kirkpatrick
Elisa Bertino
2012
conf/uss
On XACML's Adequacy to Specify and to Enforce HIPAA.
Omar Chowdhury
Haining Chen
Jianwei Niu
Ninghui Li
Elisa Bertino
2011
journals/compsec
Fine-grained integration of access control policies.
Prathima Rao
Dan Lin
Elisa Bertino
Ninghui Li
Jorge Lobo
2011
conf/ccs
Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper.
Elisa Bertino
Gabriel Ghinita
2011
conf/ccs
PUF ROKs: a hardware approach to read-once keys.
Michael S. Kirkpatrick
Sam Kerr
Elisa Bertino
2011
conf/ccs
Poster: towards attribute based group key management.
Mohamed Nabeel
Elisa Bertino
2010
conf/ccs
Controlling data disclosure in computational PIR protocols.
Ning Shang
Gabriel Ghinita
Yongbin Zhou
Elisa Bertino
2010
conf/ccs
Risk-based access control systems built on fuzzy inferences.
Qun Ni
Elisa Bertino
Jorge Lobo
2010
conf/sec
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments.
Omar Hasan
Lionel Brunie
Elisa Bertino
2009
conf/ccs
Physically restricted authentication with trusted hardware.
Michael S. Kirkpatrick
Elisa Bertino
2009
conf/ccs
D-algebra for composing access control policy decisions.
Qun Ni
Elisa Bertino
Jorge Lobo
2007
conf/esorics
Conditional Privacy-Aware Role Based Access Control.
Qun Ni
Dan Lin
Elisa Bertino
Jorge Lobo
2007
conf/icics
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.
Anna Cinzia Squicciarini
Abhilasha Bhargav-Spantzel
Elisa Bertino
Alexei B. Czeksis
2005
conf/ccs
Secure collaboration in mediator-free environments.
Mohamed Shehab
Elisa Bertino
Arif Ghafoor
2005
conf/acsac
Intrusion Detection in RBAC-administered Databases.
Elisa Bertino
Ashish Kamra
Evimaria Terzi
Athena Vakali
2004
journals/istr
Access control for XML documents and data.
Elisa Bertino
Barbara Carminati
Elena Ferrari
2003
journals/compsec
RBAC models - concepts and trends.
Elisa Bertino
2003
conf/esorics
Signature and Access Control Policies for XML Documents.
Elisa Bertino
Elena Ferrari
Loredana Parasiliti Provenza
2002
conf/ccs
A temporal key management scheme for secure broadcasting of XML documents.
Elisa Bertino
Barbara Carminati
Elena Ferrari
2001
journals/istr
Role Based Access Control Models.
Carlo Bellettini
Elisa Bertino
Elena Ferrari
2001
journals/istr
XML security.
Elisa Bertino
Barbara Carminati
Elena Ferrari
2001
conf/ih
Hiding Association Rules by Using Confidence and Support.
Elena Dasseni
Vassilios S. Verykios
Ahmed K. Elmagarmid
Elisa Bertino
1998
conf/esorics
An Authorization Model and Its Formal Semantics.
Elisa Bertino
Francesco Buccafurri
Elena Ferrari
Pasquale Rullo
1997
conf/sp
Providing flexibility in information flow control for object oriented systems.
Elena Ferrari
Pierangela Samarati
Elisa Bertino
Sushil Jajodia
1996
conf/ccs
An Advanced Commit Protocol for MLS Distributed Database Systems.
Indrajit Ray
Elisa Bertino
Sushil Jajodia
Luigi V. Mancini
1996
conf/ccs
A Non-Timestamped Authorization Model for Data Management Systems.
Elisa Bertino
Sushil Jajodia
Pierangela Samarati
1996
conf/sec
A decentralized temporal autoritzation model.
Elisa Bertino
Claudio Bettini
Elena Ferrari
Pierangela Samarati
1996
conf/sp
Supporting Multiple Access Control Policies in Database Systems.
Elisa Bertino
Sushil Jajodia
Pierangela Samarati
1995
conf/nspw
Research issues in authorization models for hypertext systems.
Elisa Bertino
Pierangela Samarati
1994
conf/ccs
A Temporal Authorization Model.
Elisa Bertino
Claudio Bettini
Pierangela Samarati
1994
conf/nspw
A discretionary access control model with temporal authorizations.
Elisa Bertino
Claudio Bettini
Pierangela Samarati
1994
conf/sp
Collecting garbage in multilevel secure object stores.
Elisa Bertino
Luigi V. Mancini
Sushil Jajodia
1994
conf/esorics
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
Alessandro Ciampichetti
Elisa Bertino
Luigi V. Mancini
1993
conf/ccs
Authorizations in Relational Database Management Systems.
Elisa Bertino
Pierangela Samarati
Sushil Jajodia
1993
conf/ccs
High Assurance Discretionary Access Control for Object Bases.
Elisa Bertino
Pierangela Samarati
Sushil Jajodia
1993
conf/sp
Achieving stricter correctness requirements in multilevel secure databases.
Vijayalakshmi Atluri
Elisa Bertino
Sushil Jajodia
Coauthors
Abdullah Al Ishtiaq
(2)
Abhilasha Bhargav-Spantzel
(1)
Abubakar Sadiq Sani
(3)
Aditi Gupta
(3)
Adnan Ahmad
(1)
Adrian Shuai Li
(2)
Ahmed K. Elmagarmid
(1)
Aleksandar Ignjatovic
(2)
Alessandra Russo
(2)
Alessandro Ciampichetti
(1)
Alexei B. Czeksis
(1)
Amani Abu Jabal
(1)
Amani M. Abu Jabal
(1)
Amin Beheshti
(1)
Anand Mudgerikar
(3)
Ananthram Swami
(1)
Anh Nguyen
(1)
Aniello Castiglione
(1)
Ankush Singla
(5)
Anna Cinzia Squicciarini
(1)
Antonino Rullo
(1)
Arif Ghafoor
(1)
Arun Iyengar
(1)
Ashish Kamra
(1)
Ashish Kundu
(2)
Asmaa Sallam
(2)
Athena Vakali
(1)
Athman Bouguettaya
(1)
Attila A. Yavuz
(2)
Attila Altay Yavuz
(1)
Bahman Rashidi
(3)
Baochen Yan
(1)
Barbara Carminati
(3)
Beomjin Jin
(1)
Bharath Kumar Samanthula
(1)
Bilal Shebaro
(3)
Boualem Benatallah
(1)
Branka Vucetic
(1)
Brian Whitworth
(1)
Carlo Bellettini
(1)
Carol J. Fung
(3)
Chang Xu
(1)
Changda Wang
(1)
Claudio Bettini
(3)
Dan Lin
(2)
Danfeng (Daphne) Yao
(1)
Danfeng Yao
(1)
Daniel Cunnington
(1)
Daniele Midi
(2)
Daren Fadolalkarim
(1)
David A. Basin
(1)
Dawu Gu
(1)
Di Jin
(1)
Diethelm Ostry
(2)
Dinesh C. Verma
(4)
Dong Yuan
(3)
Dongxi Liu
(1)
Doowon Kim
(1)
Edoardo Serra
(1)
Ehsanul Kabir
(1)
Elena Dasseni
(1)
Elena Ferrari
(8)
Elisa Bertino
(116)
Eunsoo Kim
(1)
Evimaria Terzi
(1)
Fabrizio Cicala
(2)
Fang-Yu Rao
(2)
Feng Hao
(2)
Francesco Buccafurri
(1)
Furkh Zeshan
(1)
Gabriel Ghinita
(2)
Gavin Pearson
(1)
Geeth de Mel
(2)
Greg Cirincione
(1)
Guandong Xu
(1)
Guomin Yang
(1)
Haining Chen
(1)
Hasini Gunasinghe
(1)
Hehao Li
(1)
Huihui Gong
(1)
HweeHwa Pang
(1)
Hyoungshick Kim
(1)
Hyunwoo Lee
(4)
Ilsun You
(3)
Imtiaz Karim
(10)
Indrajit Ray
(1)
Ioannis Papapanagiotou
(1)
Irene Manotas
(2)
Jiahe Lan
(1)
Jian Weng
(1)
Jianfeng Ma
(1)
Jianwei Niu
(1)
Jie Wang
(1)
Jongho Won
(3)
Jorge Lobo
(6)
Juanru Li
(7)
Kangjie Lu
(1)
Kazi Samin Mubasshir
(1)
Ke Meng
(1)
Kwok-Yan Lam
(1)
Laurence T. Yang
(1)
Leon Reznik
(1)
Lionel Brunie
(3)
Loredana Parasiliti Provenza
(1)
Luigi V. Mancini
(3)
Maria Luisa Damiani
(1)
Mark Law
(2)
Mathias Payer
(1)
Mayank Dave
(1)
Michael S. Kirkpatrick
(5)
Mingzhe Wang
(1)
Minming Huang
(1)
Mirza Masfiqur Rahman
(1)
Mitziu Echeverria
(3)
Mohamed Nabeel
(1)
Mohamed Shehab
(1)
Mohammad Allahbakhsh
(1)
Mohsen Rezvani
(1)
Ning Shang
(2)
Ninghui Li
(9)
Norman Foo
(1)
Omar Chowdhury
(8)
Omar Hasan
(3)
Oyindamola Oluwatimi
(2)
Panpan Han
(1)
Pasquale Rullo
(1)
Pierangela Samarati
(9)
Prathima Rao
(1)
Puneet Sharma
(1)
Qibin Sun
(1)
Qinbao Xu
(1)
Qun Ni
(3)
Ralf Sasse
(1)
Robert H. Deng
(3)
Robert S. Friedman
(1)
Rouzbeh Behnia
(2)
Ruidong Han
(1)
Runhan Feng
(1)
Russell Paulet
(1)
Salmin Sultana
(2)
Sam Kerr
(2)
Sanjay Jha
(2)
Sanjay K. Jha
(1)
Sayanton V. Dibbo
(1)
Seraphin B. Calo
(3)
Seung-Hyun Seo
(2)
Shagufta Mehnaz
(2)
Shakthidhar Reddy Gopavaram
(1)
Shonda Witherspoon
(1)
Siqi Ma
(7)
Sonam Bhardwaj
(1)
Sorin Adam Matei
(1)
Surya Nepal
(4)
Sushil Jajodia
(8)
Syed Rafiul Hussain
(10)
Tam Vu
(1)
Valentina Casola
(1)
Vassilios S. Verykios
(1)
Verica Sekulic
(1)
Vijayalakshmi Atluri
(1)
Wei Bao
(1)
Wei Jiang
(1)
Weicheng Wang
(2)
Wenbo Yang
(1)
Willy Susilo
(1)
Xiaokui Shu
(1)
Xing Han
(1)
Xue Zhang
(1)
Xun Yi
(6)
Yan Huang
(1)
Yang Liu
(1)
Yang Yang
(1)
Yi Fang
(1)
Yingjiu Li
(1)
Yiwei Zhang
(4)
Yongbin Zhou
(1)
Yu Yu
(1)
Yuheng Zhang
(1)
Yunlong Lyu
(1)
Zeyuan Chen
(1)
Zhao Yang Dong
(3)
Zheng Yan
(2)
Zhuo Ma
(2)
Zilin Shen
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to