Table of Contents
|
Information Security Theory and Practice Olivier Blazy, Chan Yeob Yeun |
Front Matter |
Invited Papers
|
Blockchain and the GDPR: A Data Protection Authority Point of View Amandine Jambert |
3-6 |
Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk) Damien Vergnaud |
7-11 |
Real World
|
Bringing Kleptography to Real-World TLS Adam Janovsky, Jan Krhovjak, Vashek Matyas |
15-27 |
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers Etienne Tehrani, Jean-Luc Danger, Tarik Graba |
28-43 |
Generating a Real-Time Constraint Engine for Network Protocols Mohamed Rakha, Fahim Imam, Thomas Dean |
44-60 |
Cryptography
|
On the Non-repudiation of Isogeny Based Signature Scheme Sookyung Eom, Hyang-Sook Lee, Seongan Lim |
63-77 |
Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation Louis Cianciullo, Hossein Ghodosi |
78-90 |
Linear Depth Integer-Wise Homomorphic Division Hiroki Okada, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto |
91-106 |
Artificial Learning
|
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection Moulay Elaabid, Khaled Karray, Jean-Luc Danger, Sylvain Guilley |
109-128 |
Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper Julia Meister, Raja Akram, Konstantinos Markantonakis |
129-144 |
Cybersecurity
|
Cybersecurity Behaviour: A Conceptual Taxonomy Thulani Mashiane, Elmarie Kritzinger |
147-156 |
Remote Credential Management with Mutual Attestation for Trusted Execution Environments Carlton Shepherd, Raja Akram, Konstantinos Markantonakis |
157-173 |
Detection of Bitcoin-Based Botnets Using a One-Class Classifier Bruno Zarpelão, Rodrigo Miani, Muttukrishnan Rajarajan |
174-189 |
Internet of Things
|
A Family of Lightweight Twisted Edwards Curves for the Internet of Things Sankalp Ghatpande, Johann Großschädl, Zhe Liu |
193-206 |
A Generic Lightweight and Scalable Access Control Framework for IoT Gateways Juan Parra Rodriguez |
207-222 |