We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Blockchain Technology Accelerating Industry 4.0

    Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related...
    Jan Pennekamp, Lennart Bader, ... Klaus Wehrle in Blockchains
    Chapter 2024
  2. Blockchain Technology for E-Governance Applications

    Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer...
    Ras Dwivedi, Nilesh Vasita, ... Sandeep Shukla in Blockchains
    Chapter 2024
  3. Decentralized Identity Management and Blockchains: Design Patterns and Architectures

    Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...
    Hye-young Paik, Yue Liu, ... Salil S. Kanhere in Blockchains
    Chapter 2024
  4. COBRA: Comparison-Optimal Betting for Risk-Limiting Audits

    Risk-limiting audits (RLAs) can provide routine, affirmative evidence that reported election outcomes are correct by checking a random sample of cast...
    Conference paper 2024
  5. Consolidation of Ground Truth Sets for Weakness Detection in Smart Contracts

    Smart contracts are small programs on the blockchain that often handle valuable assets. Vulnerabilities in smart contracts can be costly, as time has...
    Conference paper 2024
  6. Publicly Verifiable Auctions with Privacy

    Online auctions have a steadily growing market size, creating billions of US dollars in sales value every year. To ensure fairness and auditability...
    Conference paper 2024
  7. Uniswap Liquidity Provision: An Online Learning Approach

    Uniswap v3 is a decentralized exchange (DEX) that allows liquidity providers to allocate funds more efficiently by specifying an active price...
    Conference paper 2024
  8. The Hidden Shortcomings of (D)AOs – An Empirical Study of On-Chain Governance

    Decentralized autonomous organizations (DAOs) are a recent innovation in organizational structures, which are already widely used in the blockchain...
    Rainer Feichtinger, Robin Fritsch, ... Roger Wattenhofer in Financial Cryptography and Data Security. FC 2023 International Workshops
    Conference paper 2024
  9. The Principal–Agent Problem in Liquid Staking

    Proof-of-stake systems require stakers to lock up their funds in order to participate in consensus validation. This leads to capital inefficiency, as...
    Conference paper 2024
  10. The Current Era of Chatbots

    In this chapter we’re moving on from the fundamentals of chatbots right to the cutting edge. Chatbots are no longer a mere scientific curiosity or...
    Robert Ciesla in The Book of Chatbots
    Chapter 2024
  11. Chatbots as Villains: The Antisocial Uses of AI

    There’s no denying chatbots and artificial intelligence are a powerful phenomenon. So far we have mostly discussed their positive impact on the...
    Robert Ciesla in The Book of Chatbots
    Chapter 2024
  12. Enforcing the GDPR

    Violations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently, building IT support to implement...
    François Hublet, David Basin, Srđan Krstić in Computer Security – ESORICS 2023
    Conference paper 2024
  13. FSmell: Recognizing Inline Function in Binary Code

    Function recognition is one of the most critical tasks in binary analysis and reverse engineering. However, the recognition of inline functions still...
    Wei Lin, Qingli Guo, ... **aorui Gong in Computer Security – ESORICS 2023
    Conference paper 2024
  14. Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication

    Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it...
    Lin Li, Chao Chen, ... Yang **ang in Computer Security – ESORICS 2023
    Conference paper 2024
  15. Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring

    5G network technology is being rapidly adopted in various critical infrastructures, mainly due to its unique benefits (e.g., higher throughput, lower...
    Md Nazmul Hoq, Jia Wei Yao, ... Mourad Debbabi in Computer Security – ESORICS 2023
    Conference paper 2024
  16. Tactics for Account Access Graphs

    Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both...
    Luca Arnaboldi, David Aspinall, ... Saša Radomirović in Computer Security – ESORICS 2023
    Conference paper 2024
  17. Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference

    Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes...
    Mengfei Ren, Haotian Zhang, ... Yu Lei in Computer Security – ESORICS 2023
    Conference paper 2024
  18. Efficient Pruning for Machine Learning Under Homomorphic Encryption

    Privacy-preserving machine learning (PPML) solutions are gaining widespread popularity. Among these, many rely on homomorphic encryption (HE) that...
    Ehud Aharoni, Moran Baruch, ... Roman Vaculin in Computer Security – ESORICS 2023
    Conference paper 2024
  19. AttnCall: Refining Indirect Call Targets in Binaries with Attention

    Accurate Control Flow Graphs are crucial for effective binary program analysis, while solving indirect function call targets is its major challenge....
    Rui Sun, Yinggang Guo, ... Qingkai Zeng in Computer Security – ESORICS 2023
    Conference paper 2024
  20. You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults

    It is natural for Internet users to use a password vault to encrypt and manage numerous passwords with a master password. Using one to rule all that...
    Tingting Rao, Yixin Su, ... Hai ** in Computer Security – ESORICS 2023
    Conference paper 2024
Did you find what you were looking for? Share feedback.