Functional 发表于 2025-3-28 14:47:17

Outsourcing Signatures of Confidential Documents, to securely outsource the signature of a confidential document he owns to a digital signature provider. On the one hand, the client gets a valid standard signature of his confidential document while the signature provider learns nothing more from the document than its digest. On the other hand, the

雪崩 发表于 2025-3-28 19:51:42

Trust Evaluation Model for Attack Detection in Social Internet of Things,d objects to interact in order to offer a variety of attractive services and applications. However, with this emerging paradigm, people feel wary and cautious. They worry about revealing their data and violating their privacy. Without trustworthy mechanisms to guarantee the reliability of user’s com

Formidable 发表于 2025-3-28 23:38:17

http://reply.papertrans.cn/84/8309/830816/830816_43.png

eustachian-tube 发表于 2025-3-29 05:25:38

Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning,ishing campaigns that are increasingly more targeted and last for increasingly shorter life spans. Browser-based phishing detectors that are specialized for a . set of targeted web sites and that are based . on the overall . of a target could be a very effective tool in this respect. Approaches of t

厌烦 发表于 2025-3-29 10:48:17

Privacy Preserving Data Offloading Based on Transformation,ution performance, it raises new challenges regarding security. Privacy leakage risks prevent users from sharing their private data with third-party services. State-of-the-art approaches used for secure data storage are cryptography based, having an overhead of key management as well as do not suppo

刀锋 发表于 2025-3-29 11:44:49

DSTC: DNS-Based Strict TLS Configurations,e known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g. non Forward-Secrecy), mainly to provide backward compatibility. This opens doors to downgrade attacks, as is the case of the POODLE attack [.], which exploits the client’s silent fallback to downgrade the p

Addictive 发表于 2025-3-29 16:24:50

http://reply.papertrans.cn/84/8309/830816/830816_47.png

横条 发表于 2025-3-29 20:25:17

On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper),anisms in OSNs are either non-existent or not GDPR compliant. While the absence of consent means a lack of control of the OSN user (data subject) on his personal data, non-compliant consent mechanisms can give them a false sense of control, encouraging them to reveal more personal data than they wou

Diverticulitis 发表于 2025-3-30 00:34:24

Enhancing Collaboration Between Security Analysts in Security Operations Centers,s paper we explain how a SOC is organized, we highlight the current limitations of SOCs and their consequences regarding the performance of the detection service. We propose a new collaboration process to enhance the cooperation between security analysts in order to quickly process security events a

Omniscient 发表于 2025-3-30 05:44:51

RIICS: Risk Based IICS Segmentation Method,ping the integrated system secured. Connecting this two totally different networks has numerous benefits and advantages, but introduces several security problems. . is one of the most important security measures that should be applied to integrated ICS systems. This security technique consists essen
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Risks and Security of Internet and Systems; 13th International C Akka Zemmari,Mohamed Mosbah,Frédéric Cuppens Conference proceedings 2019 S