Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Mourouzis, Theodosis"'
No significant research has been conducted so far on Intrusion detection due to data availability since, network traffic within companies is private information and no available logs can be found on the Internet for independent research. This paper a
Externí odkaz:
http://arxiv.org/abs/2107.12621
Autor:
Dima, Sofia Maria, Hasikos, Alexandros, Kampakis, Stylianos, Mourouzis, Theodosis, Papageorgiou, Andreas
In this article we present hygiea, an end-to-end blockchain-based solution for the Covid-19 pandemic. hygiea has two main objectives. The first is to allow governments to issue Covid-19 related certificates to citizens that can be verified by designa
Externí odkaz:
http://arxiv.org/abs/2107.09926
Autor:
Mourouzis, Theodosis, Tandon, Jayant
The aim of this work is to study the use of decentralization and smart contracts on blockchain networks. We investigate the implementation and use of smart contracts on the platforms Bitcoin, Ethereum and Hyperledger Fabric. Additionally, we have res
Externí odkaz:
http://arxiv.org/abs/1903.04806
The aim of this work is to study the evolution of password selection among users. We investigate whether users follow best practices when selecting passwords and identify areas in need of improvement. Four distinct publicly-available password dataset
Externí odkaz:
http://arxiv.org/abs/1804.03946
This is an exploration of Blockchain technology that is growing in popularity and it seems to be able to disrupt a plethora of industries. A research is being conducted to examine Blockchain potential to be adopted by enterprises from different secto
Externí odkaz:
http://arxiv.org/abs/1712.04649
A partial password is a mode of password-based authentication that is widely used, especially in the financial sector. It is based on a challenge-response protocol, where at each login attempt, a challenge requesting characters from randomly selected
Externí odkaz:
http://arxiv.org/abs/1701.00104
A partial password is a mode of password-based authentication that is widely used, especially in the financial sector. It is based on a challenge-response protocol, where at each login attempt, a challenge requesting characters from randomly selected
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3cb2489b27169147a8dd6c97de37f388
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.