We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Blockchain Technology Accelerating Industry 4.0

    Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related...
    Jan Pennekamp, Lennart Bader, ... Klaus Wehrle in Blockchains
    Chapter 2024
  2. Blockchain Technology for E-Governance Applications

    Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer...
    Ras Dwivedi, Nilesh Vasita, ... Sandeep Shukla in Blockchains
    Chapter 2024
  3. Decentralized Identity Management and Blockchains: Design Patterns and Architectures

    Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...
    Hye-young Paik, Yue Liu, ... Salil S. Kanhere in Blockchains
    Chapter 2024
  4. Enforcing the GDPR

    Violations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently, building IT support to implement...
    François Hublet, David Basin, Srđan Krstić in Computer Security – ESORICS 2023
    Conference paper 2024
  5. FSmell: Recognizing Inline Function in Binary Code

    Function recognition is one of the most critical tasks in binary analysis and reverse engineering. However, the recognition of inline functions still...
    Wei Lin, Qingli Guo, ... **aorui Gong in Computer Security – ESORICS 2023
    Conference paper 2024
  6. Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication

    Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it...
    Lin Li, Chao Chen, ... Yang **ang in Computer Security – ESORICS 2023
    Conference paper 2024
  7. Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring

    5G network technology is being rapidly adopted in various critical infrastructures, mainly due to its unique benefits (e.g., higher throughput, lower...
    Md Nazmul Hoq, Jia Wei Yao, ... Mourad Debbabi in Computer Security – ESORICS 2023
    Conference paper 2024
  8. Tactics for Account Access Graphs

    Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both...
    Luca Arnaboldi, David Aspinall, ... Saša Radomirović in Computer Security – ESORICS 2023
    Conference paper 2024
  9. Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference

    Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes...
    Mengfei Ren, Haotian Zhang, ... Yu Lei in Computer Security – ESORICS 2023
    Conference paper 2024
  10. Efficient Pruning for Machine Learning Under Homomorphic Encryption

    Privacy-preserving machine learning (PPML) solutions are gaining widespread popularity. Among these, many rely on homomorphic encryption (HE) that...
    Ehud Aharoni, Moran Baruch, ... Roman Vaculin in Computer Security – ESORICS 2023
    Conference paper 2024
  11. AttnCall: Refining Indirect Call Targets in Binaries with Attention

    Accurate Control Flow Graphs are crucial for effective binary program analysis, while solving indirect function call targets is its major challenge....
    Rui Sun, Yinggang Guo, ... Qingkai Zeng in Computer Security – ESORICS 2023
    Conference paper 2024
  12. You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults

    It is natural for Internet users to use a password vault to encrypt and manage numerous passwords with a master password. Using one to rule all that...
    Tingting Rao, Yixin Su, ... Hai ** in Computer Security – ESORICS 2023
    Conference paper 2024
  13. Spliced Region Detection and Localization in Digital Images Based on CNN Learning Guided by Color Transitions and Surface Texture

    In this paper, we deal with the problem of localization of image splicing, which has proven to be one of the major types of digital image forgery...
    Debjit Das, Ranit Das, Ruchira Naskar in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  14. An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation

    We present a generic construction of an insider secure signcryption scheme with non-interactive non-repudiation. Our construction uses as building...
    Ngarenon Togde, Augustin P. Sarr in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  15. An Empirical Analysis of Machine Learning Efficacy in Anti-Ransomware Tools

    Researchers attempt to develop more competent anti-ransomware tools that assisted by machine learning classifiers to mitigate the threats of...
    Conference paper 2024
  16. Sustainability Assessment in Manufacturing from Industry 4.0 Perspective for SMEs: A Case Study in Abrasive Waterjet Machining for Hard-To-Cut Materials

    The 4th Industrial Revolution incorporates the digital revolution in several fields, including artificial intelligence, autonomous vehicles, IoT,...
    Yakub Iqbal Mogul, Peter Myler in ICT for Engineering & Critical Infrastructures
    Conference paper 2024
  17. Experimental Results for Cryptcodes Based on Quasigroups for Transmission Through a BSC

    In this chapter, we present experimental results for cryptcodes based on quasigroups for transmission through a binary-symmetric channel (BSC). In...
    Daniela Mechkaroska, Aleksandra Popovska-Mitrovikj, Verica Bakeva in Cryptocoding Based on Quasigroups
    Chapter 2024
  18. Experimental Results for Cryptocodes Based on Quasigroups for a Gaussian Channel

    In the previous chapters we explain the algorithms and properties of cryptocodes based on quasigroups. Also, we present some experimental results...
    Daniela Mechkaroska, Aleksandra Popovska-Mitrovikj, Verica Bakeva in Cryptocoding Based on Quasigroups
    Chapter 2024
  19. Towards the Integration of Digital Avatars in Urban Digital Twins on the Cloud-to-Thing Continuum

    Urban Digital Twins (UDTs) represent a powerful tool to effectively make cities smart. Over the last few years, the interest in the social aspects of...
    Lorenzo Toro-Gálvez, Rafael García-Luque, ... Ernesto Pimentel in Current Trends in Web Engineering
    Conference paper 2024
Did you find what you were looking for? Share feedback.