We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 244 results
  1. Malicious URL Detection Using Machine Learning

    In recent years cyberattacks have become destructive and targeted. With technological advancements, diverse threats are launching in a sophisticated...
    Mayank Swarnkar, Neha Sharma, Hiren Kumar Thakkar in Predictive Data Security using AI
    Chapter 2023
  2. GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks

    Node discovery is a fundamental service for any overlay network. It is a particular challenge to provide unbiased discovery in untrustworthy...
    Andriy Panchenko, Asya Mitseva, ... Till Hering in Security and Privacy in Communication Networks
    Conference paper 2021
  3. A Blacklisting Smart Contract

    The traditional financial system has the ability to facilitate forensic investigations into crimes relating to financial fraud. The same cannot be...
    Byron Kruger, Wai Sze Leung in Business Information Systems Workshops
    Conference paper 2020
  4. Emerging plagiarism in peer-review evaluation reports: a tip of the iceberg?

    The phenomenon of plagiarism in peer-review evaluation reports remained surprisingly unrecognized, despite a notable rise of such cases in recent...

    Mikołaj Piniewski, Ivan Jarić, ... Zbigniew W. Kundzewicz in Scientometrics
    Article 29 February 2024
  5. Accountable Anonymous Credentials

    Anonymity refers to withholding the identification information associated with an interaction. In the cyberworld, anonymous authentication is an...
    Chapter 2019
  6. The DibiChain Protocol: Privacy-Preserving Discovery and Exchange of Supply Chain Information

    Connecting and exchanging information across organizations becomes increasingly important as supply chains become more complex and expectations with...
    Conference paper 2021
  7. An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning System

    This paper reports on the information sharing practices of cyber competency centres representing different sectors and constituencies. The cyber...
    Ioannis Chalkias, Cagatay Yucel, ... Vasilis Katos in Digital Transformation, Cyber Security and Resilience
    Conference paper 2024
  8. P6V2G: a privacy-preserving V2G scheme for two-way payments and reputation

    The number of electric vehicles (EVs) is steadily growing. This provides a promising opportunity for balancing the smart grid of the future, because...

    Rebecca Schwerdt, Matthias Nagel, ... Andy Rupp in Energy Informatics
    Article Open access 27 September 2019
  9. Bitcoin Blockchain System: An Overview of Security and Privacy Aspects

    Apart from creating a billion-dollar worth of cryptocurrency ecosystem, Bitcoin revolutionized the whole domain of cryptocurrencies, and it largely...
    Mauro Conti, Ankit Gangwal, ... Sushmita Ruj in Blockchains
    Chapter 2024
  10. Data Usage Control

    Data-driven business models are based on sharing and exchanging data. However, to establish a trustworthy and secure data exchange between different...
    Christian Jung, Jörg Dörr in Designing Data Spaces
    Chapter Open access 2022
  11. Ethics and the Professions

    This chapter examines the changing nature of the professions and how they cope with the impact of technology on their fields. An ethical framework...
    Chapter 2023
  12. Ethics and the Professions

    Ethics and the Professions examines the changing nature of the professions and how they cope with the impact of technology on their fields. An...
    Joseph Migga Kizza in Ethical and Secure Computing
    Chapter 2023
  13. Collaborative Deanonymization

    Privacy-seeking cryptocurrency users rely on anonymization techniques like CoinJoin and ring transactions. By using such technologies benign users...
    Patrik Keller, Martin Florian, Rainer Böhme in Financial Cryptography and Data Security. FC 2021 International Workshops
    Conference paper 2021
  14. pRate: Anonymous Star Rating with Rating Secrecy

    We introduce pRate, a novel reputation management scheme with strong security and privacy guarantees for the users and their reputation scores. The...
    Conference paper 2019
  15. Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists

    To prevent user exposure to a wide range of cyber security threats, organizations and companies often resort to deploying blacklists in DNS resolvers...
    Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis in Security and Privacy in Communication Networks
    Conference paper 2021
  16. Bijack: Breaking Bitcoin Network with TCP Vulnerabilities

    Recent studies have shown that compromising Bitcoin’s peer-to-peer network is an effective way to disrupt the Bitcoin service. While many attack...
    Shaoyu Li, Shanghao Shi, ... Wen**g Lou in Computer Security – ESORICS 2023
    Conference paper 2024
  17. Sha** Cryptocurrency Gatekeepers with a Regulatory “Trial and Error”

    In the past fifteen years, cryptocurrencies have grown from a whitepaper released on a mailing list to an ecosystem supporting millions of...
    Marilyne Ordekian, Ingolf Becker, Marie Vasek in Financial Cryptography and Data Security. FC 2023 International Workshops
    Conference paper 2024
  18. Understanding Security Challenges and Defending Access Control Models for Cloud-Based Internet of Things Network

    Access control is one of the most important measures for protecting information and system resources because it prevents unauthorized users from...
    Conference paper 2024
  19. Suggestions for Online User Studies

    During exceptional times when researchers do not have physical access to users of technology, the importance of remote user studies increases. We...
    Joni Salminen, Soon-gyo Jung, Bernard J. Jansen in HCI International 2021 - Late Breaking Papers: Design and User Experience
    Conference paper 2021
  20. A credit-like rating system to determine the legitimacy of scientific journals and publishers

    The predatory nature of a journal is in constant debate because it depends on multiple factors, which keep evolving. The classification of a journal...

    Jaime A. Teixeira da Silva, Daniel J. Dunleavy, ... Joshua Eykens in Scientometrics
    Article 18 August 2021
Did you find what you were looking for? Share feedback.