找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Privacy in Communication Networks; 17th EAI Internation Joaquin Garcia-Alfaro,Shujun Li,Moti Yung Conference proceedings 2021

[复制链接]
楼主: Adentitious
发表于 2025-3-25 03:55:04 | 显示全部楼层
Anonymous Short Communications over Social Networksng people. In this context, anonymity of senders and recipients of messages could play an important role to protect privacy in specific cases such as proximity-based services, surveys, crowdfunding, and e-democracy, in which only short communications should be protected. As the social network provid
发表于 2025-3-25 10:52:03 | 显示全部楼层
A Sybil Detection Method in OSN Based on DistilBERT and Double-SN-LSTM for Text Analysisls in OSNs are often used by attackers for public opinion intervention, topic flow filling, and dissemination of false and malicious messages. Therefore, if the credibility of the Sybil can be analyzed, then the harm of Sybil attacks can be prevented to a certain extent. Based on the analysis of exi
发表于 2025-3-25 11:44:29 | 显示全部楼层
An Empirical Study on Mobile Payment Credential Leaks and Their Exploitsy Cashier. During the payment process, both the app and Cashier rely on some credentials to secure the service. Despite the importance, many developers tend to overlook the protection of payment credentials and inadvertently expose them to the wild. Such leaks severely affect the security of end-use
发表于 2025-3-25 17:43:29 | 显示全部楼层
发表于 2025-3-25 22:49:00 | 显示全部楼层
Horus: A Security Assessment Framework for Android Crypto Walletsnot adequately protected, attackers can exploit security vulnerabilities in them to steal the private keys and gain ownership of the users’ wallets. We develop a semi-automated security assessment framework, ., specifically designed to analyze crypto wallet Android apps. We perform semi-automated an
发表于 2025-3-26 02:56:13 | 显示全部楼层
Leakuidator: Leaky Resource Attacks and Countermeasures because many resource-sharing services are inherently vulnerable due to the trade-offs made between security and functionality. Even though previous work has shown that such attacks can lead to serious privacy threats, defending against this threat is an area that has remained largely unaddressed..
发表于 2025-3-26 06:03:42 | 显示全部楼层
发表于 2025-3-26 11:41:38 | 显示全部楼层
Facilitating Parallel Fuzzing with Mutually-Exclusive Task Distributionrious inputs to the target program with the goal of discovering un-handled exceptions and crashes. In business sectors where the time budget is limited, software vendors often launch many fuzzing instances in parallel as a common means of increasing code coverage. However, most of the popular fuzzin
发表于 2025-3-26 16:36:40 | 显示全部楼层
发表于 2025-3-26 18:09:43 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-28 01:04
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表