Springer Science and Business Media LLC

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Integrating identity-based and certificate-based authenticated key exchange protocols
Springer Science and Business Media LLC - Tập 10 Số 4 - Trang 201-212 - 2011
Berkant Ustaoğlu
Mastering data privacy: leveraging K-anonymity for robust health data sharing
Springer Science and Business Media LLC - - 2024
Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro
In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical importance of privacy preservation in safeguarding sensitive and private information across various domains, there is a notable deficiency of learning and training material for privacy preservation. In this research, we present a k-anonymity algorithm ...... hiện toàn bộ
A shuffle to achieve high efficiency through pre-computation and batch verification
Springer Science and Business Media LLC - - 2013
Kun Peng
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT
Springer Science and Business Media LLC - - Trang 1-14 - 2023
Kenan Ince
The Internet of Things (IoT) is an incredibly growing technology. However, due to hardware inadequacy, IoT security is not improving to the same extent. For this reason, lightweight encryption algorithms have begun to be developed. This paper presents a method for assessing the security of Pseudorandom Number Generator (PRNG) generated binary sequences in a reasonable time using a pre-trained deep...... hiện toàn bộ
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection
Springer Science and Business Media LLC - Tập 10 - Trang 301-319 - 2011
Luciana Marconi, Mauro Conti, Roberto Di Pietro
Enforcing security often requires the two legitimate parties of a communication to determine if they share a secret, without disclosing information (e.g., the shared secret itself, or just the existence of such a secret) to third parties. In this paper, we propose CASSANDRA, a toolbox composed of three probabilistic protocols that allows two parties, each one having a subset of elements drawn by a...... hiện toàn bộ
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
Springer Science and Business Media LLC - Tập 17 - Trang 135-151 - 2017
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi
A web user who falsely accesses a compromised website is usually redirected to an adversary’s website and is forced to download malware after being exploited. Additionally, the adversary steals the user’s credentials by using information-leaking malware. The adversary may also try to compromise public websites owned by individual users by impersonating the website administrator using the stolen cr...... hiện toàn bộ
CADS-ML/DL: efficient cloud-based multi-attack detection system
Springer Science and Business Media LLC - - 2023
Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai
With the increasing adoption of cloud computing, securing cloud-based systems and applications has become a critical concern for almost every organization. Traditional security approaches such as signature-based and rule-based have limited detection capabilities toward new and sophisticated attacks. To address this issue, there has been an increasing focus on implementing Artificial Intelligence (...... hiện toàn bộ
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies
Springer Science and Business Media LLC -
W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroki Suzuki, Takashi Obi
AbstractWith the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to atta...... hiện toàn bộ
Efficient verifiably encrypted signatures from lattices
Springer Science and Business Media LLC - Tập 13 - Trang 305-314 - 2014
Kee Sung Kim, Ik Rae Jeong
Verifiably encrypted signature schemes can convince a verifier that a given ciphertext is an encryption of an ordinary signature on a given message and the ordinary signature can be recovered by the third party, called adjudicator. In 2010, Rückert et al. proposed a general construction for the verifiably encrypted signatures, and then, they also showed that there exist the lattice-based verifiabl...... hiện toàn bộ
A method for identifying Web applications
Springer Science and Business Media LLC - Tập 8 - Trang 455-467 - 2009
Mario Kozina, Marin Golub, Stjepan Groš
Web applications are ubiquitous in today’s businesses. The security of these applications is of utmost importance since security breaches might negatively impact good reputation, and even result in bankruptcy. There are different methods of assessing security of Web applications, mainly based on some automated method of scanning. One type of scan method feeds random data to the application and mon...... hiện toàn bộ
Tổng số: 612   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10