Today, phishing website attacks have emerged as a prevalent threat affecting Internet users, governments, and businesses. The key challenge is that phishers continuously deploy new techniques to create zero-day phishi...
详细信息
End-to-end verifiable e-voting schemes enhance the verifiability of individual votes during the election process. Specifically, methods for cast-as-intended verifiability empower voters to confirm that their cast vote...
详细信息
ISBN:
(纸本)9783031692307;9783031692314
End-to-end verifiable e-voting schemes enhance the verifiability of individual votes during the election process. Specifically, methods for cast-as-intended verifiability empower voters to confirm that their cast votes have not been manipulated by the voting client. There are mainly three approaches to implement cast-as-intended verifiability in remote evoting systems: (1) return-code based, (2) challenge-based and (3) second-device-approach. To investigate the usability, perceived trustworthiness and manipulation effectiveness for the second-device-approach, we conducted a user study with 133 participants. The results are similar to those from related work investigating the other two approaches.
The traditional manufacturing process seriously limits the improvement of production efficiency and product quality due to incomplete data collection and lagging information feedback. This paper uses genetic algorithm...
详细信息
The article discusses issues related to the development of educational platforms, the main feature of which is the use of an interactive sandbox, on the basis of which the features of information technology, computer ...
详细信息
In this paper, we present a unique 2D high resolution, compact, low-cost, lightweight, and highly accurate millimeter-wave imagery system capable of operating in all weather conditions. We explain different aspects of...
详细信息
This paper studies the digital transformation and upgrading algorithms of universities based on artificial intelligence. Through the precise docking of the digital transformation and development of the manufacturing i...
详细信息
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823480
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in Their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-based Cryptographic Protocols for Three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for The Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-based zkSNARK in Bitcoin Script;Homomorphic Encryption based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
In this paper an initial formalization for a novel communication specification language in multi-agent systems (MASs) based on Pi-calculus and holonic MASs is introduced and analyzed. The novel language called Awkward...
详细信息
ISBN:
(纸本)9783031777301;9783031777318
In this paper an initial formalization for a novel communication specification language in multi-agent systems (MASs) based on Pi-calculus and holonic MASs is introduced and analyzed. The novel language called Awkward Pi-nguin (or APi for short) is aimed towards modeling and execution of complex service oriented architectures, heterogeneous cloud systems, containerized microservice architectures and similar complex systems by specifying the communication flows between processed (agents) and organizing them hierarchically into holons. We provide a literature review and initial motivation for introducing a new language as well as give preliminary results of the language development process.
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823619
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in Their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-based Cryptographic Protocols for Three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for The Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-based zkSNARK in Bitcoin Script;Homomorphic Encryption based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
Cloud Computing (CC) offers a diverse range of services along with huge data storage across a network. CC has collaborated with varied emerging technologies like IoT because of its numerous advantages. Despite CC'...
详细信息
暂无评论