A blockchain based approach for the definition of auditable access control systems
This work proposes to exploit blockchain technology to define Access Control systems that
guarantee the auditability of access control policies evaluation. The key idea of our proposal …
guarantee the auditability of access control policies evaluation. The key idea of our proposal …
A survey of cyber security trends, emerging technologies and threats
Data are on Internet-connected devices and the number of these devices is increasing
exponentially, the challenges are also mushrooming for the cyber security experts in …
exponentially, the challenges are also mushrooming for the cyber security experts in …
Measuring privacy leaks in online social networks
A Srivastava, G Geethakumari - 2013 International Conference …, 2013 - ieeexplore.ieee.org
Online Social Networking has gained huge popularity amongst the masses. It is common for
the users of Online Social Networks (OSNs) to share information with digital friends but in …
the users of Online Social Networks (OSNs) to share information with digital friends but in …
Online social network security: a comparative review using machine learning and deep learning
C Kumar, TS Bharati, S Prakash - Neural Processing Letters, 2021 - Springer
In the present era, Online Social Networking has become an important phenomenon in
human society. However, a large section of users are not aware of the security and privacy …
human society. However, a large section of users are not aware of the security and privacy …
Network analysis of erc20 tokens trading on ethereum blockchain
Issuance of cryptocurrencies on top of the Blockchain system by startups and private sector
companies is becoming a ubiquitous phenomenon, inducing the trading of these crypto …
companies is becoming a ubiquitous phenomenon, inducing the trading of these crypto …
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
With the rapid increase of threats on the Internet, people are continuously seeking privacy
and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for …
and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for …
Ethical dilemmas using social media in qualitative social research: A case study of online participant observation
K Hennell, M Limmer… - Sociological research …, 2020 - journals.sagepub.com
Social media platforms that enable users to create and share online content with others are
used increasingly in social research. This article explores the complex ethical issues …
used increasingly in social research. This article explores the complex ethical issues …
Selfholding: A combined attack model using selfish mining with block withholding attack
Bitcoin is one of the most influential digital cryptocurrencies in the world, of which the
security is under serious threat. One of the most serious security problems is facing several …
security is under serious threat. One of the most serious security problems is facing several …
Z-channel: Scalable and efficient scheme in zerocash
Decentralized ledger-based cryptocurrencies like Bitcoin present a way to construct
payment systems without trusted banks. However, the anonymity of Bitcoin is fragile. Many …
payment systems without trusted banks. However, the anonymity of Bitcoin is fragile. Many …
Towards link inference attack against network structure perturbation
The increasing popularity and diversity of social media sites have resulted in an emergent
number of available social networks. These social networks are now the source of …
number of available social networks. These social networks are now the source of …