


default search action
SEC 2023: Poznan, Poland
- Norbert Meyer
, Anna Grocholewska-Czurylo
:
ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Revised Selected Papers. IFIP Advances in Information and Communication Technology 679, Springer 2024, ISBN 978-3-031-56325-6 - Sven Zemanek
, Sebastian Tauchert
, Max Jens Ufer
, Lilli Bruckschen
:
Web Content Integrity: Tamper-Proof Websites Beyond HTTPS. 1-14 - Hiroaki Kikuchi
:
Privacy-Preserving Clustering for Multi-dimensional Data Randomization Under LDP. 15-29 - Tino Jungebloud
, Nhung H. Nguyen
, Dong Seong Kim
, Armin Zimmermann
:
Hierarchical Model-Based Cybersecurity Risk Assessment During System Design. 30-44 - Peter Hamm
, Sebastian Pape
, Kai Rannenberg:
The Influence of Privacy Concerns on Cryptocurrency Acceptance. 45-58 - Kéren Saint-Hilaire
, Frédéric Cuppens
, Nora Cuppens
, Joaquín García-Alfaro
:
Automated Enrichment of Logical Attack Graphs via Formal Ontologies. 59-72 - August See, Tatjana Wingarz, Matz Radloff, Mathias Fischer:
Detecting Web Bots via Mouse Dynamics and Communication Metadata. 73-86 - Jun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu, Liming Fang:
Practical Single-Round Secure Wildcard Pattern Matching. 87-101 - Sigurd Eskeland
, Svetlana Boudko
:
Efficient Non-interactive Anonymous Communication. 102-116 - Mengqing Yang
, Chunxiao Ye
, Yuanmu Liu, Yan Jin, Chunming Ye:
PointPuff: An Ed25519 Optimization Implementation. 117-130 - Maximilian Wittig, Dogan Kesdogan:
Detecting Web Tracking at the Network Layer. 131-148 - Christos Karapapas
, George C. Polyzos
, Constantinos Patsakis
:
What's Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass. 149-162 - George Kornaros
, Georgia Berki, Miltos D. Grammatikakis:
Quantum-Secure Communication for Trusted Edge Computing with IoT Devices. 163-176 - Hannes Holm, Jenni Reuben:
Evaluation of a Red Team Automation Tool in Live Cyber Defence Exercises. 177-190 - Almamy Touré, Youcef Imine, Thierry Delot, Antoine Gallais, Alexis Semnont, Robin Giraudo:
Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe. 191-206 - Jinfeng Chen, Hua Wu, Suyue Wang
, Guang Cheng, Xiaoyan Hu:
An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network. 207-221 - Aikaterini Soumelidou
, Aggeliki Tsohou
:
Towards an Information Privacy Competency Model for the Usage of Mobile Applications. 222-235 - Pascal Wichmann
, August See, Hannes Federrath:
SecPassInput: Towards Secure Memory and Password Handling in Web Applications. 236-249 - Efstratios Chatzoglou
, Vyron Kampourakis
, Georgios Kambourakis
:
Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames. 250-264 - David A. Cordova Morales
, Ahmad Samer Wazan
, David W. Chadwick
, Romain Laborde
, April Rains Reyes Maramara
, Kalil Cabral
:
Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates. 265-278 - Janaka Senanayake
, Sampath Rajapaksha
, Naoto Yanai
, Chika Komiya
, Harsha Kalutarage
:
MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis. 279-292 - Lukás Sadlek
, Pavel Celeda
:
Cyber Key Terrain Identification Using Adjusted PageRank Centrality. 293-306 - Dominik Soukup
, Daniel Uhrícek
, Daniel Vasata
, Tomás Cejka
:
Machine Learning Metrics for Network Datasets Evaluation. 307-320 - Vanessa Bracamonte, Sebastian Pape, Sascha Löbner:
Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing Tools. 321-334 - Anting Lu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu:
Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack. 335-349 - Qisheng Chen
, Kazumasa Omote
:
Toward the Establishment of Evaluating URL Embedding Methods Using Intrinsic Evaluator via Malicious URLs Detection. 350-360 - Kodai Hatakeyama, Daisuke Kotani
, Yasuo Okabe
:
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. 361-375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.