Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Bernd Prünster"'
Autor:
Bernd Prünster, Felix Hörandner
Publikováno v:
SECRYPT
Publikováno v:
TrustCom
The permission system of Android has continuously evolved to better guard the privacy of users. New permissions have been introduced and existing methods which were abused now require a permission or have been entirely removed. Retrieving private dat
Publikováno v:
Scopus-Elsevier
Peer-to-peer networks are an attractive alternative to classical client-server architectures in several fields of application such as voice-over-IP telephony and file sharing. Recently, a new peer-to-peer solution called the InterPlanetary File Syste
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fb763550237d0e4e8738b4336f306c49
http://arxiv.org/abs/2011.00874
http://arxiv.org/abs/2011.00874
Autor:
Gerald Palfinger, Bernd Prünster
Publikováno v:
ARES
In recent Android versions, access to various (unique) identifiers has been restricted or completely removed for third-party applications. However, many information sources can still be combined to create a fingerprint, effectively substituting the n
Publikováno v:
ICETE (2)
Publikováno v:
Network and System Security ISBN: 9783030657444
NSS
NSS
This paper tackles the issue of access control in fully decentralised systems. Previously, access control always fell back to some degree of centralisation. Our work approaches this problem by outsourcing access policy evaluation to the millions of t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e76e56bdc59c20aeea802926a2830f99
https://doi.org/10.1007/978-3-030-65745-1_18
https://doi.org/10.1007/978-3-030-65745-1_18
Publikováno v:
ICETE (2)
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030372309
SecureComm (2)
SecureComm (2)
Certificate misissuance is a growing issue in the context of phishing attacks, as it leads inexperienced users to further trust fraudulent websites, if they are equipped with a technically valid certificate. Certificate Transparency (CT) aims at incr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2239d314e75532c67dd632b5c3028ed8
https://doi.org/10.1007/978-3-030-37231-6_18
https://doi.org/10.1007/978-3-030-37231-6_18
Publikováno v:
ICETE (2)
In connected mobile app settings, back-ends have no means to reliably verify the integrity of clients. For this reason, services aimed at mobile users employ (unreliable) heuristics to establish trust. We tackle the issue of mobile client trust on th
Publikováno v:
SAC
A broad range of emerging business models relies on the continual exchange of data that flow among different services to generate additional value and derive knowledge in many domains. The magnitude of resource sharing that form the basis of these in