Accept All: The Landscape of Cookie Banners in Greece and the UK (Englisch)
- Neue Suche nach: Kampanos, Georgios
- Neue Suche nach: Shahandashti, Siamak F.
- Neue Suche nach: Kampanos, Georgios
- Neue Suche nach: Shahandashti, Siamak F.
In:
ICT systems security and privacy protection
; 213-227
;
2021
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Accept All: The Landscape of Cookie Banners in Greece and the UK
-
Beteiligte:Kampanos, Georgios ( Autor:in ) / Shahandashti, Siamak F. ( Autor:in )
-
Kongress:SEC ; 36. ; 2021 ; Online
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham, Switzerland
-
Erscheinungsdatum:2021
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in GermanyHöller, Paul / Krumeich, Alexander / Jacono, Luigi Lo et al. | 2021
- 19
-
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education CredentialsMore, Stefan / Grassberger, Peter / Hörandner, Felix / Abraham, Andreas / Klausner, Lukas Daniel et al. | 2021
- 36
-
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable CredentialsHariri, Ali / Bandopadhyay, Subhajit / Rizos, Athanasios / Dimitrakos, Theo / Crispo, Bruno / Rajarajan, Muttukrishnan et al. | 2021
- 53
-
A Performance Assessment of Free-to-Use Vulnerability Scanners - RevisitedAraújo, Ricardo / Pinto, António / Pinto, Pedro et al. | 2021
- 66
-
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone DetectionJang, Hajin / Yang, Kyeongseok / Lee, Geonwoo / Na, Yoonjong / Seideman, Jeremy D. / Luo, Shoufu / Lee, Heejo / Dietrich, Sven et al. | 2021
- 83
-
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router FirmwareCheng, Kai / Fang, Dongliang / Qin, Chuan / Wang, Huizhao / Zheng, Yaowen / Yu, Nan / Sun, Limin et al. | 2021
- 103
-
ESQABE: Predicting Encrypted Search QueriesMeers, Isaac / Ouax, Mariano Di Martino. Peter / Lamotte, Wim et al. | 2021
- 118
-
Reconnection-Based Covert Channels in Wireless NetworksZillien, Sebastian / Wendzel, Steffen et al. | 2021
- 134
-
Minecraft Altered Skin Channel (MASC)Abrams, Sam / Keller, Brandon / Nero, Kenneth / Placella, Gino / Johnson, Daryl et al. | 2021
- 146
-
Lattice-Based Weak Curve Fault Attack on ECDSACao, Weiqiong / Shi, Hongsong / Chen, Hua / Wei, Wei / Chen, Jiazhe et al. | 2021
- 165
-
HyperSec: Visual Analytics for Blockchain Security MonitoringPutz, Benedikt / Böhm, Fabian / Pernul, Günther et al. | 2021
- 181
-
100 Popular Open-Source Infosec ToolsKaksonen, Rauli / Järvenpää, Tommi / Pajukangas, Jukka / Mahalean, Mihai / Röning, Juha et al. | 2021
- 196
-
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME AdministratorsWazan, Ahmad Samer / Chadwick, David W. / Venant, Remi / Laborde, Romain / Benzekri, Abdelmalek et al. | 2021
- 213
-
Accept All: The Landscape of Cookie Banners in Greece and the UKKampanos, Georgios / Shahandashti, Siamak F. et al. | 2021
- 228
-
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To?Geier, Oleg / Herrmann, Dominik et al. | 2021
- 242
-
Compiling Personal Data and Subject Categories from App Data ModelsBurkert, Christian / Blochberger, Maximilian / Federrath, Hannes et al. | 2021
- 256
-
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-APPPape, Sebastian / Harborth, David / Kröger, Jacob Leon et al. | 2021
- 270
-
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish CitizensPadyab, Ali / Kävrestad, Joakim et al. | 2021
- 287
-
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC SecurityLee, Junwon / Lee, Heejo et al. | 2021
- 302
-
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol EncryptionŠpaček, Stanislav / Tovarňkák, Daniel / Čeleda, Pavel et al. | 2021
- 317
-
Advanced Cowrie Configuration to Increase Honeypot DeceptivenessCabral, Warren Z. / Valli, Craig / Sikos, Leslie F. / Wakeling, Samuel G. et al. | 2021
- 332
-
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software SystemsBüttner, Andre / Neuyen, Hoai Viet / Gruschka, Nils / Iacono, Luigi Lo et al. | 2021
- 351
-
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised LeamingLee, 9 Kr Sangyup / Tariq, Shahroz / Kim, Junyaup / Woo, Simon S. et al. | 2021
- 367
-
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and EnsemblesBartoszewski, Filip Wieslaw / Just, Mike / Lones, Michael A. / Mandrychenko, Oleksii et al. | 2021
- 382
-
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error PatternsKim, Young Geun / Yun, Jeong-Han / Han, Siho / Kim, Hyoung Chun / Woo, Simon S. et al. | 2021
- 401
-
What Is Lurking in Your Backups?Lenard, Ben / Rasin, Alexander / Scope, Nick / Wagner, James et al. | 2021
- 416
-
How Do Users Chain Email Accounts Together?Kraus, Lydia / Syvidronovda, Mária / Stobert, Elizabeth et al. | 2021
- 430
-
Tensions that Hinder the Implementation of Digital Security GovernanceSchinagl, Stef / Khapova, Svetlana / Shahim, Abbas et al. | 2021