作者: 花束 時間: 2025-3-21 23:24 作者: 說不出 時間: 2025-3-22 03:00
Scalable Two-Factor Authentication Using Historical Dataorage regardless of the size of the historical data. Leveraging on the data retrieval and searching capability of contemporary big data technologies, the proposed authentication factor can achieve realtime, fault-tolerant verification. The use of historical data as an authentication factor has a ver作者: 有法律效應 時間: 2025-3-22 06:17
On the Implications of Zipf’s Law in Passwords (e.g., authentication, encryption, signature and secret share) can be 2–4 orders of magnitude more accurately captured (formulated) than existing formulation results. As password protocols are the most widely used cryptographic protocols, our new formulation is of practical significance. Secondly, 作者: heckle 時間: 2025-3-22 12:32 作者: brother 時間: 2025-3-22 13:54
A Machine Learning Approach for Detecting Third-Party Trackers on the Webh-quality blacklists. To solve these problems, we firstly use the structural hole theory to preserve first-party trackers, and only detect third-party trackers based on supervised machine learning by exploiting the fact that trackers and non-trackers always call different JavaScript APIs for differe作者: brother 時間: 2025-3-22 18:13
PEACE Data in the Cluster Active Archiveappeared in public domain blacklists and more than 94?% of the blacklisted domain names did not appear in such public blacklists for several weeks or even months after they were first reported in abuse complaints, (2) more than 40?% of the SMS spam domains were active for over 100 days, and (3) the 作者: 否認 時間: 2025-3-22 22:12 作者: 無法治愈 時間: 2025-3-23 04:14
The Cnidaria, Past, Present and Futureorage regardless of the size of the historical data. Leveraging on the data retrieval and searching capability of contemporary big data technologies, the proposed authentication factor can achieve realtime, fault-tolerant verification. The use of historical data as an authentication factor has a ver作者: 殘酷的地方 時間: 2025-3-23 06:18
https://doi.org/10.1007/978-3-319-31305-4 (e.g., authentication, encryption, signature and secret share) can be 2–4 orders of magnitude more accurately captured (formulated) than existing formulation results. As password protocols are the most widely used cryptographic protocols, our new formulation is of practical significance. Secondly, 作者: Hangar 時間: 2025-3-23 10:42
Sharing as Cultural Revolution, is firstly devised to allow the cloud perform OFFT in the encrypted domain, without disclosing either the coefficient privacy or the input privacy. Based on OFFT, we propose an efficient secure outsourced polynomial multiplication protocol OPMUL which is further exploited in designing the final eff作者: Mets552 時間: 2025-3-23 16:55
The Co-production of Public Servicesh-quality blacklists. To solve these problems, we firstly use the structural hole theory to preserve first-party trackers, and only detect third-party trackers based on supervised machine learning by exploiting the fact that trackers and non-trackers always call different JavaScript APIs for differe作者: 輕浮女 時間: 2025-3-23 18:09 作者: GLOSS 時間: 2025-3-23 22:47 作者: Ischemia 時間: 2025-3-24 03:38 作者: 輕彈 時間: 2025-3-24 08:19
Comparing Password Ranking Algorithms on Real-World Password Datasetsrally choose predictable and weak passwords. In this paper, we address the question: How to best check weak passwords? We model different password strength checking methods as Password Ranking Algorithms (PRAs), and introduce two methods for comparing different PRAs: the .-Residual Strength Graph (.作者: 錢財 時間: 2025-3-24 14:38 作者: certitude 時間: 2025-3-24 16:55
On the Implications of Zipf’s Law in Passwordsasswords in a highly skewed way, it has long been assumed in the password research literature that users choose passwords randomly and uniformly. This is partly because it is easy to derive concrete (numerical) security results under the uniform assumption, and partly because we do . know what’s the作者: 發(fā)源 時間: 2025-3-24 22:40 作者: handle 時間: 2025-3-25 03:12 作者: 讓步 時間: 2025-3-25 04:13 作者: Credence 時間: 2025-3-25 09:11
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysisect the code loading itself, we focus on the changes it causes on the memory paging of the Windows operating system. As our method focuses on the anomalies caused by code loading, we are able to detect a wide range of code loading techniques. Our results indicate that we can detect code loading malw作者: eulogize 時間: 2025-3-25 15:27
Mobile Application Impersonation Detection Using Dynamic User Interface Extractionerfaces from mobile apps and analyzes the extracted screenshots to detect impersonation. As the detection is based on the visual appearance of the application, as seen by the user, our approach is robust towards the attack implementation technique and resilient to simple detection avoidance methods 作者: colloquial 時間: 2025-3-25 17:46 作者: 細胞膜 時間: 2025-3-25 22:23
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructionsn efficient protocol for securely outsourcing multi-exponentiations proposed at ESORICS 2014. We show that this scheme does not achieve the claimed security guarantees and we present practical polynomial-time attacks on the delegation protocol which allow the untrusted helper to recover part (or the作者: 樹木心 時間: 2025-3-26 01:18
Attribute-Based Signatures for Supporting Anonymous Certificationing blocks of anonymous certification schemes, we identify ABS limitations to fulfill AC properties, and we propose a new system model along with a concrete mathematical construction based on standard assumptions and the random oracle model. Our solution has several advantages. First, it provides a 作者: Angioplasty 時間: 2025-3-26 07:50 作者: Madrigal 時間: 2025-3-26 10:08
https://doi.org/10.1007/978-3-030-37097-8by employing attribute-based encryption technique, our protocol also realizes the fine-grained access control on the stored data. To be compatible with our RSA-based approach, we also present a deterministic and memory-efficient ‘keyword to prime’ hash function, which may be of independent interest.作者: 金桌活畫面 時間: 2025-3-26 13:46 作者: 低位的人或事 時間: 2025-3-26 19:54
Andreas Bernhardt,Konstantin Korotovse a single untrusted computational resource and to limit the computational cost of the limited device to a constant number of (generic) group operations. In particular, we show that our constructions are actually optimal in terms of operations in the underlying group.作者: 名義上 時間: 2025-3-26 21:06
Toward an Efficient Website Fingerprinting Defensen realistic evaluation conditions. In a closed-world setting, this defense reduces the accuracy of the state-of-the-art attack from 91?% to 20?%, while introducing zero latency overhead and less than 60?% bandwidth overhead. In an open-world, the attack precision is just 1?% and drops further as the number of sites grows.作者: 天賦 時間: 2025-3-27 03:22
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queriesby employing attribute-based encryption technique, our protocol also realizes the fine-grained access control on the stored data. To be compatible with our RSA-based approach, we also present a deterministic and memory-efficient ‘keyword to prime’ hash function, which may be of independent interest.作者: 雪上輕舟飛過 時間: 2025-3-27 05:58 作者: PURG 時間: 2025-3-27 10:25 作者: 甜食 時間: 2025-3-27 14:59
Conference proceedings 2016he papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things..作者: Bricklayer 時間: 2025-3-27 19:42 作者: Metamorphosis 時間: 2025-3-27 23:13 作者: cardiopulmonary 時間: 2025-3-28 05:36
Conference proceedings 20162016, held in Heraklion, Greece, in September 2016...The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authent作者: Enteropathic 時間: 2025-3-28 08:19 作者: 牌帶來 時間: 2025-3-28 12:10
Mobile Application Impersonation Detection Using Dynamic User Interface Extractionsuch as code obfuscation. We analyzed over 150,000 mobile apps and detected over 40,000 cases of impersonation. Our work demonstrates that impersonation detection through user interface extraction is effective and practical at large scale.作者: Granular 時間: 2025-3-28 18:26
0302-9743 , network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things..978-3-319-45743-7978-3-319-45744-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: expdient 時間: 2025-3-28 20:29
0302-9743 on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016...The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security作者: 車床 時間: 2025-3-29 02:35
Cnidarian Alien Species in Expansion as the system is a few steps ahead of potential operations causing violations. We present detailed models and algorithms, and report real-life experiences and challenges faced while implementing our solution in OpenStack. We also conduct experiments whose results confirm the efficiency and scalability of our approach.作者: Macronutrients 時間: 2025-3-29 05:42 作者: Meander 時間: 2025-3-29 09:26 作者: BARK 時間: 2025-3-29 13:44 作者: Organization 時間: 2025-3-29 17:44 作者: 沖擊力 時間: 2025-3-29 20:21 作者: insidious 時間: 2025-3-30 03:45 作者: Palpitation 時間: 2025-3-30 04:44
PEACE Data in the Cluster Active ArchiveInternet resources. Bulk messaging services can be used to send unsolicited SMS messages to phone numbers. While the long-term properties of email spam tactics have been extensively studied, such behavior for SMS spam is not well understood. In this paper, we discuss a novel SMS abuse attribution sy作者: 新陳代謝 時間: 2025-3-30 10:53
Cluster - Science and Mission Overview, traffic with prerecorded web traffic templates. The defenses that have been proposed to counter these attacks are impractical for deployment in real-world systems due to their high cost in terms of added delay and bandwidth overhead. Further, these defenses have been designed to counter attacks tha作者: Encephalitis 時間: 2025-3-30 13:38