標題: Titlebook: ICT Systems Security and Privacy Protection; 38th IFIP TC 11 Inte Norbert Meyer,Anna Grocholewska-Czury?o Conference proceedings 2024 IFIP [打印本頁] 作者: 方言 時間: 2025-3-21 19:39
書目名稱ICT Systems Security and Privacy Protection影響因子(影響力)
書目名稱ICT Systems Security and Privacy Protection影響因子(影響力)學科排名
書目名稱ICT Systems Security and Privacy Protection網(wǎng)絡公開度
書目名稱ICT Systems Security and Privacy Protection網(wǎng)絡公開度學科排名
書目名稱ICT Systems Security and Privacy Protection被引頻次
書目名稱ICT Systems Security and Privacy Protection被引頻次學科排名
書目名稱ICT Systems Security and Privacy Protection年度引用
書目名稱ICT Systems Security and Privacy Protection年度引用學科排名
書目名稱ICT Systems Security and Privacy Protection讀者反饋
書目名稱ICT Systems Security and Privacy Protection讀者反饋學科排名
作者: 恫嚇 時間: 2025-3-21 22:27 作者: 死貓他燒焦 時間: 2025-3-22 02:12 作者: Conducive 時間: 2025-3-22 08:00 作者: Instinctive 時間: 2025-3-22 11:42 作者: 保守黨 時間: 2025-3-22 13:37
Efficient Non-interactive Anonymous Communication,untraceable communication that avoids some of the significant shortcomings of existing methods. Using non-interactive privacy-preserving aggregation as an underlying building block we achieve attractive features, including unsurpassed low computational and transmission overhead of only 3 encryptions per participant in only a single round.作者: 都相信我的話 時間: 2025-3-22 17:38
1868-4238 s. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forensics; industry networks security, etc.?.978-3-031-56328-7978-3-031-56326-3Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: Adrenal-Glands 時間: 2025-3-22 21:17
,Privacy-Preserving Clustering for?Multi-dimensional Data Randomization Under LDP, called RR-independent and RR-Ind-Joint schemes. The experiments using some open datasets demonstrate that the dependencies of attributes can be estimated accurately and that the proposed algorithm outperforms existing state-of-the-art schemes in cases where the dimensionality is high.作者: 傻 時間: 2025-3-23 03:46
Hierarchical Model-Based Cybersecurity Risk Assessment During System Design,reotypes. Various security attributes, including vulnerability information and asset values, are then used by algorithms to compute relevant properties including threat space, possible attack paths, and selected network-based security metrics. A real-life industrial example is then used to demonstrate the approach.作者: voluble 時間: 2025-3-23 08:30 作者: TEN 時間: 2025-3-23 13:19
Conference proceedings 202423, held in Poznan, Poland, in June 2023.?..The 26 full papers included in this book were carefully reviewed and selected from 84 submissions. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forens作者: 爵士樂 時間: 2025-3-23 17:36
Detecting Web Tracking at the Network Layer,sical application area in the future would be the use in areas where communication can only be accessed on encrypted TCP/IP level (keyword secure IoT environments) or the presented approach is used simply to enable a classical extension of the portfolio for tracker detection.作者: engrossed 時間: 2025-3-23 21:30 作者: 凹槽 時間: 2025-3-24 00:27
Christos Karapapas,George C. Polyzos,Constantinos Patsakispproaches for confined lesions such as video-assisted thoracoscopic surgery (VATS). A problem often encountered during VATS is localizing the tumor, depending on its position relative to the lung surface. Pulmonary lesions located 5mm or more from the visceral pleura with a diameter of 10mm or less 作者: Deceit 時間: 2025-3-24 04:26
George Kornaros,Georgia Berki,Miltos Grammatikakisf MR imaging. This is true despite the fact that there are so far only rare indications which definitely require MR imaging as a guidance tool. But some lesions which are only detectable by MR imaging require MR guidance or MR-guided localization and marking (Solomon et al. 2002). Among these, breas作者: neolith 時間: 2025-3-24 09:45 作者: fetter 時間: 2025-3-24 11:16 作者: 忘川河 時間: 2025-3-24 18:13 作者: 虛弱 時間: 2025-3-24 19:40 作者: Epithelium 時間: 2025-3-25 00:17 作者: ANTE 時間: 2025-3-25 03:53 作者: 小教堂 時間: 2025-3-25 09:01
Tino Jungebloud,Nhung H. Nguyen,Dong Seong Kim,Armin Zimmermann作者: 聲音刺耳 時間: 2025-3-25 11:52
Kéren Saint-Hilaire,Frédéric Cuppens,Nora Cuppens,Joaquin Garcia-Alfaro作者: abduction 時間: 2025-3-25 17:52
August See,Tatjana Wingarz,Matz Radloff,Mathias Fischer作者: 杠桿支點 時間: 2025-3-25 21:11 作者: mettlesome 時間: 2025-3-26 04:04
Mengqing Yang,Chunxiao Ye,Yuanmu Liu,Yan Jin,Chunming Ye作者: Annotate 時間: 2025-3-26 07:06 作者: DRAFT 時間: 2025-3-26 11:09 作者: 長矛 時間: 2025-3-26 14:26
Practical Single-Round Secure Wildcard Pattern Matching,aring schemes. The insight of our proposed protocol is the reduction from the WPM to the process of secret sharing and reconstruction in a novel way. We provide a customized OT construction and apply the OT extension technique to the protocol, where the client and the server need merely a constant n作者: insurgent 時間: 2025-3-26 17:22 作者: ethereal 時間: 2025-3-26 22:23 作者: 周興旺 時間: 2025-3-27 01:30
,An Accurate and?Real-Time Detection Method for?Concealed Slow HTTP DoS in?Backbone Network,uting scenarios. We also use Slow HTTP DoS Sketch to record the features quickly and accurately. In experiments that used public backbone datasets as background traffic, the results show that even with a large number of unidirectional flows and a sampling rate of 1/64, our method can still accuratel作者: DEBT 時間: 2025-3-27 06:09 作者: STALE 時間: 2025-3-27 11:42
,SecPassInput: Towards Secure Memory and?Password Handling in?Web Applications,valuate the security benefits of . by measuring how long values remain in memory after they are no longer needed, finding that the on-screen keyboard of . guarantees immediate removal from memory after triggering . ’s clear operation.作者: gout109 時間: 2025-3-27 15:23
Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames,the root cause of the respected vulnerabilities, pinpointing shortcomings. Following a coordinated vulnerability disclosure process, our findings have been promptly communicated to each affected AP vendor, already receiving positive feedback, as well as, at the time of writing, a reserved common vul作者: Instantaneous 時間: 2025-3-27 19:20 作者: 誓言 時間: 2025-3-28 01:58
Web Content Integrity: Tamper-Proof Websites Beyond HTTPS, compromised web server. Such integrity assurances can then be used to implement a secure end-to-end encryption application built in the form of a website. Our framework encompasses developers, the Domain Name System, and web browsers. To accomplish the integrity guarantees, our framework makes use 作者: 大溝 時間: 2025-3-28 03:46 作者: NEXUS 時間: 2025-3-28 08:00 作者: 消極詞匯 時間: 2025-3-28 11:05 作者: 舊石器 時間: 2025-3-28 18:33
,Automated Enrichment of?Logical Attack Graphs via?Formal Ontologies,n and recovery plans. There are different attack graph-building approaches. We focus on logical attack graphs. Networks and vulnerabilities constantly change; we propose an attack graph enrichment approach based on semantic augmentation post-processing of the logic predicates. Mapping attack graphs 作者: Ostrich 時間: 2025-3-28 19:08 作者: 使長胖 時間: 2025-3-28 22:58
Practical Single-Round Secure Wildcard Pattern Matching,ed in a server. Meanwhile, the server should not learn any information about the pattern or the matching results. . (WPM) problem, a specific variant with more realistic significance, defines that the pattern contains wildcards that can match any character in the text..Previous studies introduce var作者: Dawdle 時間: 2025-3-29 04:45 作者: 上漲 時間: 2025-3-29 07:40
PointPuff: An Ed25519 Optimization Implementation,nsive attention for its “High-speed and High-security” features. However, as shown by some test data, the performance of Ed25519, especially in terms of signature verification, remains unsatisfactory. Therefore, we improved the algorithm of Ed25519 batch verification in all three layers of elliptic 作者: 創(chuàng)造性 時間: 2025-3-29 11:53 作者: 改變 時間: 2025-3-29 18:00 作者: chandel 時間: 2025-3-29 22:09
,Quantum-Secure Communication for?Trusted Edge Computing with?IoT Devices,ed gateways that connect with the cloud, perform machine-to-machine communication, often transmiting large amount data up and down the network, performing time-sensitive processing and involving intelligent local decision-making. In view of a sharp increase in cyberattacks today targeting edge compu作者: inhibit 時間: 2025-3-30 03:14 作者: confederacy 時間: 2025-3-30 04:31
,Automated and?Improved Detection of?Cyber Attacks via?an?Industrial IDS Probe,rusion detection via IDS probes, an adequate fundamental solution is required. Indeed, most of existing solutions address a specific context which does not allow to assess the efficiency of the proposed models on a different context. Therefore, we propose in this paper an approach for malicious flow作者: Compassionate 時間: 2025-3-30 09:43 作者: Concrete 時間: 2025-3-30 15:46
Towards an Information Privacy Competency Model for the Usage of Mobile Applications,cy is urgent. Focusing on this emerging need, this study aims at highlighting the main competencies that a user of mobile apps should hold in order to protect their information privacy. The contribution of the paper is threefold; First, it proposes a framework which describes the actions that users 作者: Herbivorous 時間: 2025-3-30 20:33
,SecPassInput: Towards Secure Memory and?Password Handling in?Web Applications,required. Applications instead need to rely on the garbage collector to eventually clear sensitive data from memory. When accessing input fields natively provided by the browser via JavaScript, their values are accessed through primitive type variables and thus affected by this limitation..In this p作者: 人充滿活力 時間: 2025-3-30 22:51
Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames, community. This work introduces two new denial of service (DoS) attacks against contemporary Wi-Fi 5 and 6 networks. Differently from similar works in the literature which focus on 802.11 management frames, the introduced assaults exploit control frames. Both these attacks target the central elemen作者: attenuate 時間: 2025-3-31 04:55
,Enhancing the?ACME Protocol to?Automate the?Management of?All X.509 Web Certificates,ntication on the Internet. PKCs are issued by a trusted third-party Certification Authority (CA), which is responsible for verifying the certificate requester’s information. Recent developments in web PKI show a high proliferation of Domain Validated (DV) certificates but a decline in Extended Valid作者: unstable-angina 時間: 2025-3-31 06:00
Christos Karapapas,George C. Polyzos,Constantinos Patsakisns such as smokers, 65% of patients present with noncalcified lung nodules, with less than 5% of lesions smaller than 1 cm being malignant. However, the incidence of malignancy increases dramatically above 1 cm lesion diameter (Diederich 2003). Even though lesion calcification helps to identify beni作者: ARIA 時間: 2025-3-31 11:59
George Kornaros,Georgia Berki,Miltos Grammatikakisresonance (MR) imaging. For many indications all these techniques are “me too” alternatives. If there is no medical reason to prefer one imaging modality over another, factors such as availability, simplicity, and cost are of great importance. Looking at any of those cofactors, it is evident that MR作者: Compassionate 時間: 2025-3-31 13:51
Hannes Holm,Jenni Reubenns such as smokers, 65% of patients present with noncalcified lung nodules, with less than 5% of lesions smaller than 1 cm being malignant. However, the incidence of malignancy increases dramatically above 1 cm lesion diameter (Diederich 2003). Even though lesion calcification helps to identify beni作者: Alcove 時間: 2025-3-31 19:16 作者: RAFF 時間: 2025-4-1 01:09 作者: Aspirin 時間: 2025-4-1 02:32
Efstratios Chatzoglou,Vyron Kampourakis,Georgios Kambourakisg constrained to ever smaller packaging dimensions. The heat from the e-motor confined to the smaller designs will inevitably lead to higher transmission operating temperatures, necessitating the use of higher temperature resistant plastics and requiring the efficient removal of excess heat..This wi作者: 補充 時間: 2025-4-1 08:57