Springer Science and Business Media LLC

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Integrating identity-based and certificate-based authenticated key exchange protocols
Springer Science and Business Media LLC - Tập 10 Số 4 - Trang 201-212 - 2011
Berkant Ustaoğlu
Mastering data privacy: leveraging K-anonymity for robust health data sharing
Springer Science and Business Media LLC - - 2024
Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro
In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical importance of privacy preservation in safeguarding sensitive and private information across various domains, there is a notable deficiency of learning and training material for privacy preservation. In this research, we present a k-anonymity algorithm ...... hiện toàn bộ
A shuffle to achieve high efficiency through pre-computation and batch verification
Springer Science and Business Media LLC - - 2013
Kun Peng
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT
Springer Science and Business Media LLC - - Trang 1-14 - 2023
Kenan Ince
The Internet of Things (IoT) is an incredibly growing technology. However, due to hardware inadequacy, IoT security is not improving to the same extent. For this reason, lightweight encryption algorithms have begun to be developed. This paper presents a method for assessing the security of Pseudorandom Number Generator (PRNG) generated binary sequences in a reasonable time using a pre-trained deep...... hiện toàn bộ
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
Springer Science and Business Media LLC - Tập 17 - Trang 135-151 - 2017
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi
A web user who falsely accesses a compromised website is usually redirected to an adversary’s website and is forced to download malware after being exploited. Additionally, the adversary steals the user’s credentials by using information-leaking malware. The adversary may also try to compromise public websites owned by individual users by impersonating the website administrator using the stolen cr...... hiện toàn bộ
CADS-ML/DL: efficient cloud-based multi-attack detection system
Springer Science and Business Media LLC - - 2023
Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai
With the increasing adoption of cloud computing, securing cloud-based systems and applications has become a critical concern for almost every organization. Traditional security approaches such as signature-based and rule-based have limited detection capabilities toward new and sophisticated attacks. To address this issue, there has been an increasing focus on implementing Artificial Intelligence (...... hiện toàn bộ
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies
Springer Science and Business Media LLC -
W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroki Suzuki, Takashi Obi
AbstractWith the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to atta...... hiện toàn bộ
A method for identifying Web applications
Springer Science and Business Media LLC - Tập 8 - Trang 455-467 - 2009
Mario Kozina, Marin Golub, Stjepan Groš
Web applications are ubiquitous in today’s businesses. The security of these applications is of utmost importance since security breaches might negatively impact good reputation, and even result in bankruptcy. There are different methods of assessing security of Web applications, mainly based on some automated method of scanning. One type of scan method feeds random data to the application and mon...... hiện toàn bộ
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware
Springer Science and Business Media LLC - - Trang 1-27 - 2023
Silviu Viţel, Marilena Lupaşcu, Dragoş Teodor Gavriluţ, Henri Luchian
This paper analyzes the efficiency of various machine learning models (artificial neural networks, random forest, decision tree, AdaBoost and XGBoost) against the evolution of VBA-based (Visual Basic for Applications) malware over a large period of time (1995–2021). The file set used in our research is comprehensive—approximately 1.9 million files (out of which 944,595 are malicious and the rest a...... hiện toàn bộ
A new strong security model for stateful authenticated group key exchange
Springer Science and Business Media LLC - Tập 17 - Trang 423-440 - 2017
Zheng Yang, Chao Liu, Wanping Liu, Daigu Zhang, Song Luo
Stateful authenticated group key exchange (stAGKE) represents an important class of authenticated group key exchange (AGKE) such as tree-based AGKE. The computation of either ephemeral public key or session key in a new stAGKE session may be based on the ephemeral secret state from some previously established session. We notice that earlier AGKE models may be not able to provide appropriate securi...... hiện toàn bộ
Tổng số: 612   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10