標(biāo)題: Titlebook: Security and Privacy in Communication Networks; 18th EAI Internation Fengjun Li,Kaitai Liang,Sokratis K. Katsikas Conference proceedings 20 [打印本頁] 作者: 使固定 時間: 2025-3-21 19:19
書目名稱Security and Privacy in Communication Networks影響因子(影響力)
書目名稱Security and Privacy in Communication Networks影響因子(影響力)學(xué)科排名
書目名稱Security and Privacy in Communication Networks網(wǎng)絡(luò)公開度
書目名稱Security and Privacy in Communication Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Security and Privacy in Communication Networks被引頻次
書目名稱Security and Privacy in Communication Networks被引頻次學(xué)科排名
書目名稱Security and Privacy in Communication Networks年度引用
書目名稱Security and Privacy in Communication Networks年度引用學(xué)科排名
書目名稱Security and Privacy in Communication Networks讀者反饋
書目名稱Security and Privacy in Communication Networks讀者反饋學(xué)科排名
作者: covert 時間: 2025-3-21 22:52 作者: oxidize 時間: 2025-3-22 00:38
FairBlock: Preventing Blockchain Front-Running with?Minimal Overheads. Along the way, we present a model for fair block processing and build a prototype implementation. We show that on a sample of 1000 messages with 1000 validators our system saves 42.53 MB of bandwidth which is 99.6% less compared with the standard threshold decryption paradigm.作者: 翻動 時間: 2025-3-22 04:37 作者: recede 時間: 2025-3-22 10:41
Blockchain-Based Ciphertext Policy-Hiding Access Control Schemeryption. We then solve the user attribute revocation problem and single point of failure in the cloud-based access control models using ethereum. Finally, security analysis, the theoretical results, and experimental results show that the proposed solution is secure and efficient.作者: vocation 時間: 2025-3-22 16:16
1867-8211 edings..?The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows:?AI for Security,?Applied Cryptography,?Binary Analysis,?Blockchain,?Cryptography,??Data Security,?Intrusion Detection,?Mobile Security,?Net作者: HARD 時間: 2025-3-22 19:51
Classification-Based Anomaly Prediction in?XACML Policieses for different applications, especially web services. XACML policies have become more complex and difficult to administer in distributed systems, which increases the chance of anomalies (redundancy, inconsistency, irrelevancy, and incompleteness). Due to the lack of effective analysis mechanisms a作者: vasospasm 時間: 2025-3-22 21:21 作者: 嚴重傷害 時間: 2025-3-23 02:19
SecureBERT: A Domain-Specific Language Model for?Cybersecurityation. Increased connection and automation have revolutionized the world’s economic and cultural infrastructures, while they have introduced risks in terms of cyber attacks. CTI is information that helps cybersecurity analysts make intelligent security decisions, that is often delivered in the form 作者: 向下五度才偏 時間: 2025-3-23 07:30 作者: Anthology 時間: 2025-3-23 11:50 作者: Arctic 時間: 2025-3-23 17:42 作者: 集中營 時間: 2025-3-23 18:04
Another Lattice Attack Against ECDSA with?the?wNAF to?Recover More Bits per?Signaturee the calculation speed of the scalar multiplication of ECDSA. This paper presents a practical cache side channel attack on ECDSA implementations which use wNAF representation. Compared with existing works, our method exploits more information from the cache side channels, which is then efficiently 作者: 征稅 時間: 2025-3-24 01:39
MAG-PUF: Magnetic Physical Unclonable Functions for?Device Authentication in?the?IoTof IoT devices hardly support dynamic re-keying solutions, hence being vulnerable to several attacks. To provide a viable general-purpose solution, in this paper we propose MAG-PUF, a novel lightweight authentication scheme based on the usage of unintentional magnetic emissions generated by IoT devi作者: SEEK 時間: 2025-3-24 03:11
A Cross-layer Plausibly Deniable Encryption System for?Mobile Devicesryption is usually incorporated into major mobile operating systems. However, traditional encryption can not defend against coercive attacks in which victims are forced to disclose the key used to decrypt the sensitive data. To combat the coercive attackers, plausibly deniable encryption (PDE) has b作者: 無政府主義者 時間: 2025-3-24 09:02
Language and?Platform Independent Attribution of?Heterogeneous Codely, researchers have attempted to develop cross-platform and language-oblivious attribution approaches. Most of these attempts were limited to small sets of two-three languages or few platforms. However, rapid development of cross-platform malware and general language, platform and architecture dive作者: epinephrine 時間: 2025-3-24 14:38 作者: myalgia 時間: 2025-3-24 18:16
Cost-Effective Malware Classification Based on?Deep Active Learningare classification model needs to classify the samples for further analysis. Recent success in deep learning-based malware classification, however heavily relies on the large number of labeled training samples, which may require considerable human effort. In this paper, we propose a novel malware cl作者: 不遵守 時間: 2025-3-24 20:49 作者: apiary 時間: 2025-3-25 00:50
FairBlock: Preventing Blockchain Front-Running with?Minimal Overheadsidentity-based encryption (IBE) to prevent front-running with minimal bandwidth overheads. In our approach, to decrypt a block of . transactions, the number of messages sent across the network only grows linearly with the size of decrypting committees, .. That is, to decrypt a set of . transactions 作者: PHIL 時間: 2025-3-25 03:24 作者: GRIEF 時間: 2025-3-25 08:58 作者: Cubicle 時間: 2025-3-25 14:02
Conference proceedings 2023?AI for Security,?Applied Cryptography,?Binary Analysis,?Blockchain,?Cryptography,??Data Security,?Intrusion Detection,?Mobile Security,?Network Security,?Privacy,?Software Security,?Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT)..作者: 誤傳 時間: 2025-3-25 19:13 作者: employor 時間: 2025-3-25 20:20 作者: 男生戴手銬 時間: 2025-3-26 03:55 作者: 比喻好 時間: 2025-3-26 05:58
Qige Song,Yongzheng Zhang,Shuhao Liglobalisation of markets requires firms to take an increasingly international orientation in developing communication policies. The goal of this book is to contribute to more systematic research in this field. Renowned communication researchers from around the globe have contr- uted to the making of作者: 半球 時間: 2025-3-26 09:14 作者: AND 時間: 2025-3-26 14:13 作者: 擁護者 時間: 2025-3-26 17:03 作者: Legend 時間: 2025-3-26 23:41
Ruizhong Du,Tianhe Zhangaid organisations and political donors.Locates research intoThis book provides a detailed analysis of the dimensions and dynamics of the role of international aid in the reform and capacity development of public service in post-communist Albania. It challenges the technocratic, results-based managem作者: hurricane 時間: 2025-3-27 04:57
Jingfei Bian,Nan Yu,Hong Li,Hongsong Zhu,Qiang Wang,Limin Sun作者: probate 時間: 2025-3-27 08:31
Haitao Xiao,Chen Zhang,Song Liu,Bo Jiang,Zhigang Lu,Fei Wang,Yuling Liu作者: 撕裂皮肉 時間: 2025-3-27 13:25 作者: 熱情贊揚 時間: 2025-3-27 15:50 作者: 上坡 時間: 2025-3-27 18:40 作者: COMMA 時間: 2025-3-27 23:42
Farzaneh Abazari,Enrico Branca,Evgeniya Novikova,Natalia Stakhanovas are th expanded papers from the 4 ICORIA (International Conference on Research in Advertising; www.icoria.org), which took place at Saarland University in Sa- bruecken in 2005. The book addresses a number of important areas of communication - search: advertising and communication effects; advertis作者: Constituent 時間: 2025-3-28 03:14 作者: SPECT 時間: 2025-3-28 09:01 作者: 保守 時間: 2025-3-28 13:48
s are th expanded papers from the 4 ICORIA (International Conference on Research in Advertising; www.icoria.org), which took place at Saarland University in Sa- bruecken in 2005. The book addresses a number of important areas of communication - search: advertising and communication effects; advertis作者: PSA-velocity 時間: 2025-3-28 14:42 作者: DEFT 時間: 2025-3-28 22:17
Ruizhong Du,Tianhe Zhanges the domestic challenges in the transfer process towards policy learning and makes a valuable contribution to the debate over the (voluntary vs. coercive) administrative reform in Southeast Europe in relation to the politics of EU accession.978-3-319-97834-5作者: FICE 時間: 2025-3-29 01:30
An Evolutionary Learning Approach Towards the?Open Challenge of?IoT Device Identificationtrategy is adopted on the feature representation. In addition, to alleviate the forgetting of old devices during evolutionary learning with new devices, we develop a less-forgetting constraint based on spatial knowledge distillation and impose control on the distribution distance between clusters to作者: CHYME 時間: 2025-3-29 06:38 作者: STANT 時間: 2025-3-29 08:12 作者: perpetual 時間: 2025-3-29 14:13
Another Lattice Attack Against ECDSA with?the?wNAF to?Recover More Bits per?Signatures per signature. Finally, to efficiently use the extracted information, we convert the problem of recovering the private key to the Hidden Number Problem (HNP) and the Extended Hidden Number Problem (EHNP) respectively, which are solved by lattice reduction algorithms. We applied the attack on ECDSA作者: Affection 時間: 2025-3-29 18:52
MAG-PUF: Magnetic Physical Unclonable Functions for?Device Authentication in?the?IoTxtensively assessed the performance of MAG-PUF through experiments on 25 Arduino devices and a set of exemplary reference functions. We obtained an authentication accuracy above 99%, hence proving the feasibility of using code-driven magnetic emissions as a lightweight, efficient, and robust PUF for作者: BROW 時間: 2025-3-29 21:23
A Cross-layer Plausibly Deniable Encryption System for?Mobile Devicesre, being compatible with the storage architecture of mainstream mobile devices, lightweight as well as user-oriented. Our key idea is to intercept major layers of a mobile storage system, including the file system layer (preventing loss of hidden sensitive data and enabling users to use the hidden 作者: 頌揚國家 時間: 2025-3-30 00:37
Language and?Platform Independent Attribution of?Heterogeneous Codede. We further explore the robustness of our approach in attributing developers’ code written in 27 programming languages, compiled on 14 instruction set architectures types and 18 intermediate compiled versions. Our results on the GitHub dataset show that in the worst case scenario the proposed app作者: Acetaminophen 時間: 2025-3-30 04:09
Multi-relational Instruction Association Graph for?Cross-Architecture Binary Similarity Comparison relational graph convolutional network (R-GCN) to perform type-specific graph information propagation. Our approach can bridge the gap in the cross-architecture instruction representation spaces while avoiding the external pre-training workload. We conduct extensive experiments on basic block-level作者: Left-Atrium 時間: 2025-3-30 09:22
Cost-Effective Malware Classification Based on?Deep Active Learningd on the strategy designed and oriented towards informative malware acquisition, we select samples through Convolutional Neural Network (ConvNet) to query experts for annotation according to the estimated gradients towards the last linear layer. The updated labeled dataset is then fed into the netwo作者: Hyperalgesia 時間: 2025-3-30 13:52 作者: MIRTH 時間: 2025-3-30 19:01 作者: 嗎啡 時間: 2025-3-30 23:56 作者: 一大塊 時間: 2025-3-31 04:38
978-3-031-25537-3ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2023