![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Security Problems of 5G Voice Communication
In April 2019, the world’s first 5G mobile communication was commercialized in South Korea. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communicat...
-
Chapter and Conference Paper
WheelLogger: Driver Tracing Using Smart Watch
Location-related data is one of the most sensitive data for user privacy. Theft of location-related information on mobile device poses serious threats to users. Even though the extant confirmation of permissio...
-
Chapter and Conference Paper
Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud
We present a new approach to cross channel fraud detection: build graphs representing transactions from all channels and use analytics on features extracted from these graphs. Our underlying hypothesis is communi...
-
Chapter and Conference Paper
Understanding Craigslist Rental Scams
Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first sys...
-
Chapter
Case Study: Sales Scams
This chapter focuses on a common type of consumer-facing scam referred to as the sales scam, focusing on the scam’s occurrence on Craigslist, one of the most popular online market websites, with over 60 million ...
-
Chapter and Conference Paper
Security Analysis of FHSS-type Drone Controller
Unmanned Aerial Vehicles (UAVs), or drones, have attracted a considerable amount of attentions due to their utility to civilian as well as military applications. However, the security issues involved in UAV te...
-
Chapter
Case Study: Rental Scams
In this chapter, a systematic empirical study of the online rental scams on Craigslist and its ecosystem is presented. By develo** several effective detection techniques, several major rental scam campaigns ...
-
Chapter
Identifying Scams and Trends
This chapter focuses on the taxonomy of scam emails collected from various sources and investigates long-term trends in scam emails. We first describe a large-scale compendium of scam emails collected from v...
-
Chapter and Conference Paper
Comparing Password Ranking Algorithms on Real-World Password Datasets
Password-based authentication is the most widely used authentication mechanism. One major weakness of password-based authentication is that users generally choose predictable and weak passwords. In this paper,...
-
Chapter and Conference Paper
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users
Machine learning is increasingly used as a key technique in solving many security problems such as botnet detection, transactional fraud, insider threat, etc. One of the key challenges to the widespread applic...
-
Chapter and Conference Paper
Detecting Insider Information Theft Using Features from File Access Logs
Access control is a necessary, but often insufficient, mechanism for protecting sensitive resources. In some scenarios, the cost of anticipating information needs and specifying precise access control policies...
-
Chapter and Conference Paper
Estimating Asset Sensitivity by Profiling Users
We introduce algorithms to automatically score and rank information technology (IT) assets in an enterprise, such as computer systems or data files, by their business value and criticality to the organization....
-
Chapter and Conference Paper
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs
In Vehicular Ad Hoc Networks (VANETs), because of high mobility of vehicles and frequent change of road segments, an end-to-end communication path between moving vehicles may not exist unfortunately. As a prom...
-
Chapter and Conference Paper
Analysis and Control of Uncertainty in Wireless Transmitting Devices
This paper presents a mathematical approach to estimate the measurement uncertainty in wireless transmitting devices. Although there have been efforts to estimate the uncertainty in measurements of analog circ...
-
Chapter and Conference Paper
Propagation Effects of Power Supply Fluctuation in Wireless Power Amplifiers
In this paper, the effect of power supply fluctuations on the output of wireless power amplifier has been estimated. Because of the high trans-conductance of power amplifiers, deviations in power supplies may ...
-
Chapter and Conference Paper
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs
In this paper, we propose a novel privacy-preserving location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In particular, we introduce the notion of location-a...
-
Chapter and Conference Paper
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
In this paper we introduce the notion of certificateless proxy re-encryption and also give precise definitions for secure certificateless proxy re-encryption schemes. We present a concrete scheme based on bili...
-
Chapter and Conference Paper
A Robust Conditional Privacy-Preserving Authentication Protocol in VANET
Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability a...
-
Chapter and Conference Paper
Design of a Secure Digital Contents Delivery System in P2P Networks
The growth of the Internet has created an electronic marketplace for digital goods, such as mp3, software, etc., and peer-to-peer(P2P) networks for distribution and sharing of files have enjoyed enormous popul...
-
Chapter and Conference Paper
Video Fingerprinting System Using Wavelet and Error Correcting Code
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the tree, the legitimate users as...