SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography最新文献

筛选
英文 中文
Self-Sovereign Identity (SSI) Attribute-Based Web Authentication SSI (Self-Sovereign Identity)基于属性的Web认证
Biagio Boi, M. Santis, C. Esposito
{"title":"Self-Sovereign Identity (SSI) Attribute-Based Web Authentication","authors":"Biagio Boi, M. Santis, C. Esposito","doi":"10.5220/0012121400003555","DOIUrl":"https://doi.org/10.5220/0012121400003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"21 1","pages":"758-763"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84590974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed "Hakoniwa" 国际互认:美国、英国、欧盟和日本信托服务及“Hakoniwa”试验台的描述
Satoshi Kai, T. Kondo, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka
{"title":"International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed \"Hakoniwa\"","authors":"Satoshi Kai, T. Kondo, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka","doi":"10.5220/0012124200003555","DOIUrl":"https://doi.org/10.5220/0012124200003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"93 1","pages":"764-771"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72904300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Regulating Cyber Incidents: A Review of Recent Reporting Requirements 规范网络事件:近期报告要求的回顾
Angelica Marotta, S. Madnick
{"title":"Regulating Cyber Incidents: A Review of Recent Reporting Requirements","authors":"Angelica Marotta, S. Madnick","doi":"10.5220/0012086000003555","DOIUrl":"https://doi.org/10.5220/0012086000003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"32 1","pages":"410-416"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81271150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility 基于令牌的符合ssi授予资格的电子投票系统
Dario Castellano, R. Prisco, Pompeo Faruolo
{"title":"Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility","authors":"Dario Castellano, R. Prisco, Pompeo Faruolo","doi":"10.5220/0012121100003555","DOIUrl":"https://doi.org/10.5220/0012121100003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"8 1","pages":"752-757"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78968446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic Blockchain on Generic Human Behavior 基于一般人类行为的通用区块链
Clémentine Gritti, F. A. Hayek, P. Lafourcade
{"title":"Generic Blockchain on Generic Human Behavior","authors":"Clémentine Gritti, F. A. Hayek, P. Lafourcade","doi":"10.5220/0012091700003555","DOIUrl":"https://doi.org/10.5220/0012091700003555","url":null,"abstract":". Blockchain is a type of distributed ledger. A wide range of consensus algorithms exists to reach consensus in a decentralized manner. However, most of them trade energy consumption for a degree of openness. Blockchains are primarily used for tokens and cryptocurren-cies. Often the process of minting new tokens depends on actionable real world behaviors. A difficulty persists in securely translating said behavior into a decentralized blockchain. We formalize the generic concept of Proof of Behavior (PoB), and use it to create a consensus mechanism for generic permissionless blockchains.","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"48 1","pages":"206-217"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74841729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ZT-NIDS: Zero Trust, Network Intrusion Detection System 零信任,网络入侵检测系统
Abeer Z. Alalmaie, P. Nanda, Xiangjian He
{"title":"ZT-NIDS: Zero Trust, Network Intrusion Detection System","authors":"Abeer Z. Alalmaie, P. Nanda, Xiangjian He","doi":"10.5220/0012080000003555","DOIUrl":"https://doi.org/10.5220/0012080000003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"10 1","pages":"99-110"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73118250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication 新型无人机-地面站及无人机-无人机通信认证方案的安全性研究
M. Benssalah, Karim Drouiche
{"title":"On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication","authors":"M. Benssalah, Karim Drouiche","doi":"10.5220/0012077400003555","DOIUrl":"https://doi.org/10.5220/0012077400003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"52 1","pages":"361-368"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75564448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis 网络物理系统的远程安全评估:为增强诊断调整设计模式
Kazutaka Matsuzaki, K. Sawada, S. Honiden
{"title":"Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis","authors":"Kazutaka Matsuzaki, K. Sawada, S. Honiden","doi":"10.5220/0012132600003555","DOIUrl":"https://doi.org/10.5220/0012132600003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"54 1","pages":"805-812"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73857484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems 平滑旅程:提供从已建立的跨境eID工作流程到eID钱包系统的无缝升级路径
Roland Czerny, Christian Kollmann, Blaž Podgorelec, Bernd Prünster, Thomas Zefferer
{"title":"Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems","authors":"Roland Czerny, Christian Kollmann, Blaž Podgorelec, Bernd Prünster, Thomas Zefferer","doi":"10.5220/0012091900003555","DOIUrl":"https://doi.org/10.5220/0012091900003555","url":null,"abstract":"","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"64 1","pages":"460-468"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74043724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defeating MageCart Attacks in a NAISS Way 以NAISS的方式击败MageCart攻击
Cătălin Rus, D. Sarmah, Mohammed El-hajj
{"title":"Defeating MageCart Attacks in a NAISS Way","authors":"Cătălin Rus, D. Sarmah, Mohammed El-hajj","doi":"10.5220/0012079300003555","DOIUrl":"https://doi.org/10.5220/0012079300003555","url":null,"abstract":": MageCart attacks pose a security threat to E-commerce platforms by using e-skimmers to steal payment details. Image steganography is used by attackers to conceal e-skimmers, making detection challenging. Existing solutions have limitations, such as incompatibility or insufficient functionality. This research proposes NAISS, a server-side middlebox solution that leverages digital signatures to filter unauthorized images without requiring client-side modifications. The proof-of-concept implementation demonstrates the efficacy of NAISS, filtering 100% of state of the art stegoimages, while indicating areas for further improvement.","PeriodicalId":74779,"journal":{"name":"SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography","volume":"10 1","pages":"691-697"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79711378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信