Information Security Theory and Practice
Information Security Theory and Practice
14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 - March 1, 2024, Proceedings
Sauveron, Damien; Bouzefrane, Samia
Springer International Publishing AG
06/2024
195
Mole
9783031603907
15 a 20 dias
Descrição não disponível.
.- SPAWN: Seamless Proximity-based Authentication by Utilizing the Existent WiFi Environment.
.- MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation.
.- Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks.
.- Towards Interconnected Quantum Networks: A Requirements Analysis.
.- A similarity approach for the classification of mitigations in public cybersecurity repositories into NIST-SP 800-53 catalog.
.- Top Cyber Threats: The rise of Ransomware.
.- Enhancing security in Blockchain enabled IoT networks empowered with zk -SNARKs and Physically Unclonable Functions.
.- Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture.
.- A Bitcoin-based Digital Identity Model for the Internet of Things.
.- Towards a Time-dependent Approach for User Privacy Expression and Enforcement.
.- Privacy preserving Federated Learning : A novel approach for combining Differential Privacy and Homomorphic Encryption.
.- Distributed Backdoor Attacks in Federated Learning Generated by Dynamic Triggers.
.- MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation.
.- Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks.
.- Towards Interconnected Quantum Networks: A Requirements Analysis.
.- A similarity approach for the classification of mitigations in public cybersecurity repositories into NIST-SP 800-53 catalog.
.- Top Cyber Threats: The rise of Ransomware.
.- Enhancing security in Blockchain enabled IoT networks empowered with zk -SNARKs and Physically Unclonable Functions.
.- Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture.
.- A Bitcoin-based Digital Identity Model for the Internet of Things.
.- Towards a Time-dependent Approach for User Privacy Expression and Enforcement.
.- Privacy preserving Federated Learning : A novel approach for combining Differential Privacy and Homomorphic Encryption.
.- Distributed Backdoor Attacks in Federated Learning Generated by Dynamic Triggers.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Security and Privacy in Smart Devices;Security and Privacy in Networks;Security and Privacy in Architectures;Protocols and Policies;Systems and Applications
.- SPAWN: Seamless Proximity-based Authentication by Utilizing the Existent WiFi Environment.
.- MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation.
.- Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks.
.- Towards Interconnected Quantum Networks: A Requirements Analysis.
.- A similarity approach for the classification of mitigations in public cybersecurity repositories into NIST-SP 800-53 catalog.
.- Top Cyber Threats: The rise of Ransomware.
.- Enhancing security in Blockchain enabled IoT networks empowered with zk -SNARKs and Physically Unclonable Functions.
.- Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture.
.- A Bitcoin-based Digital Identity Model for the Internet of Things.
.- Towards a Time-dependent Approach for User Privacy Expression and Enforcement.
.- Privacy preserving Federated Learning : A novel approach for combining Differential Privacy and Homomorphic Encryption.
.- Distributed Backdoor Attacks in Federated Learning Generated by Dynamic Triggers.
.- MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation.
.- Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks.
.- Towards Interconnected Quantum Networks: A Requirements Analysis.
.- A similarity approach for the classification of mitigations in public cybersecurity repositories into NIST-SP 800-53 catalog.
.- Top Cyber Threats: The rise of Ransomware.
.- Enhancing security in Blockchain enabled IoT networks empowered with zk -SNARKs and Physically Unclonable Functions.
.- Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture.
.- A Bitcoin-based Digital Identity Model for the Internet of Things.
.- Towards a Time-dependent Approach for User Privacy Expression and Enforcement.
.- Privacy preserving Federated Learning : A novel approach for combining Differential Privacy and Homomorphic Encryption.
.- Distributed Backdoor Attacks in Federated Learning Generated by Dynamic Triggers.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.