Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2022
Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers’ Perspective
- Salatiel Ezennaya-Gomez,
- Edgar Blumenthal,
- Marten Eckardt,
- Justus Krebs,
- Christopher Kuo,
- Julius Porbeck,
- Emirkan Toplu,
- Stefan Kiltz,
- Jana Dittmann
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 135, Pages 1–12https://doi.org/10.1145/3538969.3543786This paper presents an in-depth network data stream analysis on data gathering to evaluate the current data protection situation of online payment in smartphone applications. To this end, we applied a digital forensic methodology from previous work in ...
- research-articleFebruary 2022
A Study of Spectrum Management Schemes Based on Consortium Blockchain
AIPR '21: Proceedings of the 2021 4th International Conference on Artificial Intelligence and Pattern RecognitionPages 454–459https://doi.org/10.1145/3488933.3489005In the face of the rapidly growing number of users and the demand for real-time access in the 6G era, the central allocation method in traditional spectrum management will encounter processing bottlenecks, and this paper proposes a distributed spectrum ...
- research-articleJanuary 2020
A survey on distributed mobile agents' system security
International Journal of Knowledge Engineering and Soft Data Paradigms (IJKESDP), Volume 7, Issue 1Pages 14–24https://doi.org/10.1504/ijkesdp.2020.112617A multi-agent system (MAS) is a system in which there is a cooperation of autonomous entities called 'agents', with intelligent behaviour, and have the power to coordinate their goals and action plans to solve a problem or achieve an objective. They are ...
- abstractJune 2019
Children's Authentication: Understanding and Usage
IDC '19: Proceedings of the 18th ACM International Conference on Interaction Design and ChildrenPages 743–746https://doi.org/10.1145/3311927.3325354With the widespread infusion of technology into society, children (ages 5-11) not only interact with technology but are also required to create and use credentials in order to authenticate and use various platforms. My primary goal with this research is ...
- research-articleMay 2019
Security - Visible, Yet Unseen?
- Verena Distler,
- Marie-Laure Zollinger,
- Carine Lallemand,
- Peter B. Roenne,
- Peter Y. A. Ryan,
- Vincent Koenig
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsPaper No.: 605, Pages 1–13https://doi.org/10.1145/3290605.3300835An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplistic. ...
-
- research-articleSeptember 2016
Hash‐One: a lightweight cryptographic hash function
IET Information Security (ISE2), Volume 10, Issue 5Pages 225–231https://doi.org/10.1049/iet-ifs.2015.0385The increased demand for lightweight applications has triggered the need for appropriate security mechanisms in them. Lightweight cryptographic hash functions are among the major responses toward such a requirement. The authors thus have a handful of such ...
- research-articleMarch 2015
Novel and practical scheme based on secret sharing for laptop data protection
IET Information Security (ISE2), Volume 9, Issue 2Pages 100–107https://doi.org/10.1049/iet-ifs.2013.0420With the benefits of portability and mobility, laptops have become more and more popular. People usually believe that their personal laptop is safe, and they store sensitive data in it. However, when a laptop is stolen, a malicious thief can obtain ...
- research-articleDecember 2013
An adaptive distributed certificate management scheme for space information network
IET Information Security (ISE2), Volume 7, Issue 4Pages 318–326https://doi.org/10.1049/iet-ifs.2012.0253The security vulnerability of space information network is stimulating interest in developing security mechanisms study of heterogeneous network. However, it is noted that neither the single certificate authority (CA) nor the distributed CA can meet the ...
- ArticleMay 2013
Design and Implementation of e-Laboratory for Information Security Training
ECONF '13: Proceedings of the 2013 Fourth International Conference on e-Learning "Best Practices in Management, Design and Development of e-Courses: Standards of Excellence and Creativity"Pages 310–317https://doi.org/10.1109/ECONF.2013.39Information and network security have received a great attention in the past two decades and this attention will increase as the world moving dramatically towards making governmental and organizational systems computerized. Several events and scandals ...
- ArticleMarch 2013
On identifying proper security mechanisms
ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication TechnologyPages 285–294https://doi.org/10.1007/978-3-642-36818-9_29Selection of proper security mechanisms that will protect the organization's assets against cyber threats is an important non-trivial problem. This paper introduces the approach based on statistical methods that will help to choose the proper controls ...
- ArticleNovember 2012
Trust Based Security Mechanisms for Social Networks
BWCCA '12: Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and ApplicationsPages 264–270https://doi.org/10.1109/BWCCA.2012.50Inspired by the similarities between human trust and physical measurements, we have proposed a trust framework for social networks, including defining new trust metrics and their combinations, which captures both human trust level and its uncertainty, ...
- research-articleJune 2012
Fault-tolerant techniques and security mechanisms for model-based performance prediction of critical systems
ISARCS '12: Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical SystemsPages 21–30https://doi.org/10.1145/2304656.2304660Security attacks aim to system vulnerabilities that may lead to operational failures. In order to react to attacks software designers use to introduce Fault-Tolerant Techniques (FTTs), such as recovery procedures, and/or Security Mechanisms (SMs), such ...
- ArticleAugust 2011
Selecting Software Packages for Secure Database Installations
ARES '11: Proceedings of the 2011 Sixth International Conference on Availability, Reliability and SecurityPages 67–74https://doi.org/10.1109/ARES.2011.19Security is one of the biggest concerns of database administrators. Most marketed software products announce a variety of features and mechanisms designed to improve security. However, that same variety largely complicates the process of selecting the ...
- research-articleSeptember 2010
The pervasive trust foundation for security in next generation networks
NSPW '10: Proceedings of the 2010 New Security Paradigms WorkshopPages 129–142https://doi.org/10.1145/1900546.1900564We propose a new paradigm---named the Pervasive Trust Foundation (PTF) ---for computer security in Next Generation Networks, including the Future Internet. We start with a review of basic trust-related terms and concepts. We present motivation for using ...
- ArticleSeptember 2010
Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey
NBIS '10: Proceedings of the 2010 13th International Conference on Network-Based Information SystemsPages 313–320https://doi.org/10.1109/NBiS.2010.11Wireless sensor networks are specific adhoc networks. They are characterized by their limited computing power and energy constraints. This paper proposes a study of security in this kind of network. We show what are the specificities and vulnerabilities ...
- research-articleOctober 2009
A semantic-based access control mechanism using semantic technologies
SIN '09: Proceedings of the 2nd international conference on Security of information and networksPages 258–267https://doi.org/10.1145/1626195.1626259In order to overcome the shortcomings of the recent frameworks and mechanisms for semantic-based access control, this paper presents a semantic-based, context-aware, and multi-domain enabled framework implementing a semantic-based access control ...
- ArticleAugust 2009
Security analysis and design of a uniform identity authentication system
As IT systems proliferate to support business processes, users and system administrators are faced with an increasingly complicated interface to accomplish their job functions, some uniform identity authentication systems are developed to integrate ...
- ArticleJuly 2006
Simple voice security protocol
IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computingPages 367–372https://doi.org/10.1145/1143549.1143622The public telephone network has been evolving from manually switching wires carrying analog encoded voice to an automatically switched grid of copper-wired, fiber optical and wireless mobile connectivity carrying digitally encoded voice, image and ...
- articleFebruary 2006
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
International Journal of Wireless and Mobile Computing (IJWMC), Volume 1, Issue 3/4Pages 276–288https://doi.org/10.1504/IJWMC.2006.012562Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven that the WEP protocol fails to provide data confidentiality and ...
- ArticleApril 2005
Critical analysis and new perspective for securing voice networks
ICN'05: Proceedings of the 4th international conference on Networking - Volume Part IIPages 810–818https://doi.org/10.1007/978-3-540-31957-3_91Voice networks evolved from the traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to ...