![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
127 Result(s)
-
Living Reference Work Entry In depth
Cybersicherheit für die Industrie 4.0 – Aktuelle Herausforderungen
Die Abwehr von Cyberangriffen ist eine essenzielle Voraussetzung für die Robustheit und Resilienz von IT-gestützten Systemen. Beschränkten sich Angriffe in der Vergangenheit meist auf Serversysteme sowie PCs, ...
-
Chapter and Conference Paper
Firmware-Based DoS Attacks in Wireless Sensor Network
IoT devices are projected to scale up to hundreds of billions by 2030 due to its applications in agriculture, healthcare, environment, manufacturing, energy transition, and other industries. However, it raises...
-
Article
Open AccessThe ASHES 2021 special issue at JCEN
This brief editorial gives a short, two-page overview of the ASHES 2021 workshop. It shall serve as an introduction for this special issue at JCEN.
-
Chapter and Conference Paper
Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things
The design of the Internet of Things (IoT) system is a complex process, not only in terms of the balance between resource consumption and extensive functionality but also in the context of security. As various...
-
Article
Open AccessThe ASHES 2020 special issue at JCEN
This editorial provides its readers with a brief introductory overview of the ASHES workshop series in general, and of this special ASHES 2020 issue at the Journal of Cryptographic Engineering (JCEN) in partic...
-
Chapter and Conference Paper
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security
Third-party dongles for cars, e.g. from insurance companies, can extract sensitive data and even send commands to the car via the standardized OBD-II interface. Due to the lack of message authentication mechan...
-
Chapter and Conference Paper
Using Memristor Arrays as Physical Unclonable Functions
In this work, we introduce two new types of Physical Unclonable Functions (PUFs) based on memristor arrays. Both PUFs use the output behavior of memristor cells when an excitation signal is applied to their in...
-
Chapter and Conference Paper
ISO/SAE 21434-Based Risk Assessment of Security Incidents in Automated Road Vehicles
Although numerous automotive security solutions have been presented in the last years, the question of how to properly react to security incidents during vehicle operation has not yet received much attention. ...
-
Article
Open AccessELSA: efficient long-term secure storage of large datasets (full version) ∗
An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents)...
-
Chapter and Conference Paper
Safety Meets Security: Using IEC 62443 for a Highly Automated Road Vehicle
In this work, we conduct and discuss a consensus-based risk analysis for a novel architecture of a driverless and electric prototype vehicle. While well-established safety standards like ISO 26262 provide fram...
-
Chapter and Conference Paper
Secure Two-Party Computation in a Quantum World
Secure multi-party computation has been extensively studied in the past years and has reached a level that is considered practical for several applications. The techniques developed thus far have been steadily...
-
Chapter and Conference Paper
Secure Computation of the \(k^{\mathrm {th}}\) -Ranked Element in a Star Network
We consider the problem of securely computing the \(k^{\mathrm {th}}\) -ranked element in a sequence of n private integers distributed among n parties. The \(k^{\mathrm {th}}\) -ranked element (e.g., minimum, m...
-
Chapter and Conference Paper
Predicting Railway Signalling Commands Using Neural Networks for Anomaly Detection
We propose a new anomaly detection system to defend against semantic attacks on the command and control communication in safety-critical railway signalling networks. To this end, we train artificial neural net...
-
Article
Open AccessLong-term integrity protection of genomic data
Genomic data is crucial in the understanding of many diseases and for the guidance of medical treatments. Pharmacogenomics and cancer genomics are just two areas in precision medicine of rapidly growing utiliz...
-
Chapter
The Future of IT in Peace and Security
Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover...
-
Chapter
Resilient Critical Infrastructures
Critical infrastructures, such as the electric grid or transportation systems, empower our modern society. Their disruption can seriously impair the daily lives of millions of people. Due to this fact, they ar...
-
Chapter and Conference Paper
Towards Practical RAM Based Secure Computation
Secure multi-party computation (MPC) protocols are powerful privacy enhancing technologies. Yet, their scalability is limited for data intensive applications due to the circuit computation model. Therefore, RA...
-
Article
On compiling Boolean circuits optimized for secure multi-party computation
Secure multi-party computation (MPC) allows two or more distrusting parties to jointly evaluate a function over private inputs. For a long time considered to be a purely theoretical concept, MPC transitioned i...
-
Chapter and Conference Paper
A Security Architecture for Railway Signalling
We present the proposed security architecture Deutsche Bahn plans to deploy to protect its trackside safety-critical signalling system against cyber-attacks. We first present the existing reference interlockin...
-
Chapter
Introduction
Recent years have seen an increase in applications that collect and analyze private data on potentially untrusted machines. With the predominant use of cloud services, computations that were previously perform...