Search
Search Results
-
Malicious URL Detection Using Machine Learning
In recent years cyberattacks have become destructive and targeted. With technological advancements, diverse threats are launching in a sophisticated... -
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks
Node discovery is a fundamental service for any overlay network. It is a particular challenge to provide unbiased discovery in untrustworthy... -
A Blacklisting Smart Contract
The traditional financial system has the ability to facilitate forensic investigations into crimes relating to financial fraud. The same cannot be... -
Emerging plagiarism in peer-review evaluation reports: a tip of the iceberg?
The phenomenon of plagiarism in peer-review evaluation reports remained surprisingly unrecognized, despite a notable rise of such cases in recent...
-
Accountable Anonymous Credentials
Anonymity refers to withholding the identification information associated with an interaction. In the cyberworld, anonymous authentication is an... -
The DibiChain Protocol: Privacy-Preserving Discovery and Exchange of Supply Chain Information
Connecting and exchanging information across organizations becomes increasingly important as supply chains become more complex and expectations with... -
An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning System
This paper reports on the information sharing practices of cyber competency centres representing different sectors and constituencies. The cyber... -
P6V2G: a privacy-preserving V2G scheme for two-way payments and reputation
The number of electric vehicles (EVs) is steadily growing. This provides a promising opportunity for balancing the smart grid of the future, because...
-
Bitcoin Blockchain System: An Overview of Security and Privacy Aspects
Apart from creating a billion-dollar worth of cryptocurrency ecosystem, Bitcoin revolutionized the whole domain of cryptocurrencies, and it largely... -
Data Usage Control
Data-driven business models are based on sharing and exchanging data. However, to establish a trustworthy and secure data exchange between different... -
Ethics and the Professions
This chapter examines the changing nature of the professions and how they cope with the impact of technology on their fields. An ethical framework... -
Ethics and the Professions
Ethics and the Professions examines the changing nature of the professions and how they cope with the impact of technology on their fields. An... -
Collaborative Deanonymization
Privacy-seeking cryptocurrency users rely on anonymization techniques like CoinJoin and ring transactions. By using such technologies benign users... -
pRate: Anonymous Star Rating with Rating Secrecy
We introduce pRate, a novel reputation management scheme with strong security and privacy guarantees for the users and their reputation scores. The... -
Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists
To prevent user exposure to a wide range of cyber security threats, organizations and companies often resort to deploying blacklists in DNS resolvers... -
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
Recent studies have shown that compromising Bitcoin’s peer-to-peer network is an effective way to disrupt the Bitcoin service. While many attack... -
Sha** Cryptocurrency Gatekeepers with a Regulatory “Trial and Error”
In the past fifteen years, cryptocurrencies have grown from a whitepaper released on a mailing list to an ecosystem supporting millions of... -
Understanding Security Challenges and Defending Access Control Models for Cloud-Based Internet of Things Network
Access control is one of the most important measures for protecting information and system resources because it prevents unauthorized users from... -
Suggestions for Online User Studies
During exceptional times when researchers do not have physical access to users of technology, the importance of remote user studies increases. We... -
A credit-like rating system to determine the legitimacy of scientific journals and publishers
The predatory nature of a journal is in constant debate because it depends on multiple factors, which keep evolving. The classification of a journal...