Zobrazeno 1 - 10
of 183
pro vyhledávání: '"Frank Kargl"'
Publikováno v:
IEEE Access, Vol 11, Pp 125307-125327 (2023)
Recently, zero trust security has received notable attention in the security community. However, while many networks use monitoring and security functions like firewalls, their integration in the design of zero trust architectures remains largely una
Externí odkaz:
https://doaj.org/article/f25fbdd574b74166ba68fd8a3a821eb8
Publikováno v:
IEEE Access, Vol 11, Pp 55474-55514 (2023)
Modern connected or autonomous vehicles (AVs) are highly complex cyber-physical systems. As a result of the high number of different technologies and connectivity features involved, testing these systems to identify security vulnerabilities is a big
Externí odkaz:
https://doaj.org/article/6a683b36c24441cca6d8b333a53e1f6c
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. :1-16
Publikováno v:
Security and Trust Management ISBN: 9783031295034
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::895ad21b4d2c32eccdf545d0e975cb55
https://doi.org/10.1007/978-3-031-29504-1_3
https://doi.org/10.1007/978-3-031-29504-1_3
Publikováno v:
Computer Science in Cars Symposium.
Autor:
Frank Kargl, Stephan Kleber
Publikováno v:
2022 IEEE Conference on Communications and Network Security (CNS).
Reverse engineering of undocumented protocols is a common task in security analyses of networked services. The communication itself, captured in traffic traces, contains much of the necessary information to perform such a protocol reverse engineering
Publikováno v:
2022 IEEE 47th Conference on Local Computer Networks (LCN).
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 4, Pp 270-290 (2021)
Decentralized token exchanges allow for secure trading of tokens without a trusted third party. However, decentralization is mostly achieved at the expense of transaction privacy. For a fair exchange, transactions must remain private to hide the part
Publikováno v:
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W).
Publikováno v:
International Journal of Human–Computer Interaction. 37:1455-1466
It is mostly unclear which personal predispositions are associated with knowledge about how to protect one’s privacy online and actually protecting it. More elaborate knowledge on this topic may help in the design process of user interfaces. Theref