Search
Search Results
-
Blockchain Technology Accelerating Industry 4.0
Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related... -
Blockchain Technology for E-Governance Applications
Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer... -
Decentralized Identity Management and Blockchains: Design Patterns and Architectures
Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The... -
-
Enforcing the GDPR
Violations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently, building IT support to implement... -
FSmell: Recognizing Inline Function in Binary Code
Function recognition is one of the most critical tasks in binary analysis and reverse engineering. However, the recognition of inline functions still... -
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication
Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it... -
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring
5G network technology is being rapidly adopted in various critical infrastructures, mainly due to its unique benefits (e.g., higher throughput, lower... -
Tactics for Account Access Graphs
Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both... -
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes... -
Efficient Pruning for Machine Learning Under Homomorphic Encryption
Privacy-preserving machine learning (PPML) solutions are gaining widespread popularity. Among these, many rely on homomorphic encryption (HE) that... -
AttnCall: Refining Indirect Call Targets in Binaries with Attention
Accurate Control Flow Graphs are crucial for effective binary program analysis, while solving indirect function call targets is its major challenge.... -
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
It is natural for Internet users to use a password vault to encrypt and manage numerous passwords with a master password. Using one to rule all that... -
Spliced Region Detection and Localization in Digital Images Based on CNN Learning Guided by Color Transitions and Surface Texture
In this paper, we deal with the problem of localization of image splicing, which has proven to be one of the major types of digital image forgery... -
An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation
We present a generic construction of an insider secure signcryption scheme with non-interactive non-repudiation. Our construction uses as building... -
An Empirical Analysis of Machine Learning Efficacy in Anti-Ransomware Tools
Researchers attempt to develop more competent anti-ransomware tools that assisted by machine learning classifiers to mitigate the threats of... -
Sustainability Assessment in Manufacturing from Industry 4.0 Perspective for SMEs: A Case Study in Abrasive Waterjet Machining for Hard-To-Cut Materials
The 4th Industrial Revolution incorporates the digital revolution in several fields, including artificial intelligence, autonomous vehicles, IoT,... -
Experimental Results for Cryptcodes Based on Quasigroups for Transmission Through a BSC
In this chapter, we present experimental results for cryptcodes based on quasigroups for transmission through a binary-symmetric channel (BSC). In... -
Experimental Results for Cryptocodes Based on Quasigroups for a Gaussian Channel
In the previous chapters we explain the algorithms and properties of cryptocodes based on quasigroups. Also, we present some experimental results... -
Towards the Integration of Digital Avatars in Urban Digital Twins on the Cloud-to-Thing Continuum
Urban Digital Twins (UDTs) represent a powerful tool to effectively make cities smart. Over the last few years, the interest in the social aspects of...