BlockTag: Design and Applications of a Tagging System for Blockchain Analysis (English)
- New search for: Boshmaf, Yazan
- New search for: Jawaheri, Husam Al
- New search for: Sabah, Mashael Al
- New search for: Boshmaf, Yazan
- New search for: Jawaheri, Husam Al
- New search for: Sabah, Mashael Al
In:
ICT systems security and privacy protection
; 299-313
;
2019
-
ISBN:
- Conference paper / Print
-
Title:BlockTag: Design and Applications of a Tagging System for Blockchain Analysis
-
Contributors:
-
Conference:International Conference on ICT Systems Security and Privacy Protection ; 34. ; 2019 ; Lissabon
-
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Cham, Switzerland
-
Publication date:2019
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Hunting Brand Domain Forgery: A Scalable ClassificationThao, Tran Phuong / Sawaya, Yukiko / Nguyen-Son, Hoang-Quoc / Yamada, Akira / Omote, Kazumasa / Kubota, Ayumu et al. | 2019
- 19
-
GanDef: A GAN Based Adversarial Training Defense for Neural Network ClassifierLiu, Guanxiong / Khalil, Issa / Khreishah, Abdallah et al. | 2019
- 33
-
Control Logic Injection Attacks on Industrial Control SystemsYoo, Hyunguk / Ahmed, Irfan et al. | 2019
- 49
-
An Efficient and Scalable Intrusion Detection System on Logs of Distributed ApplicationsLanoë, David / Hurfin, Michel / Totel, Eric / Maziero, Carlos et al. | 2019
- 67
-
Performance of Password Guessing Enumerators Under Cracking ConditionsValois, Mathieu / Lacharme, Patrick / Bars, Jean-Marie Le et al. | 2019
- 81
-
An Offline Dictionary Attack Against zkPAKE ProtocolBecerra, José / Ryan, Peter Y. A. / Sala, Petra / Skrobot, Marjan et al. | 2019
- 91
-
Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based EncryptionZiegler, Dominik / Sabongui, Josef / Palfinger, Gerald et al. | 2019
- 105
-
Towards an Automated Extraction of ABAC Constraints from Natural Language PoliciesAlohaly, Manar / Takabi, Hassan / Blanco, Eduardo et al. | 2019
- 120
-
Removing Problems in Rule-Based PoliciesCheng, Zheng / Royer, Jean-Claude / Tisi, Massimo et al. | 2019
- 134
-
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the WildWiefling, Stephan / Tacono, Luigi Lo / Dürmuth, Markus et al. | 2019
- 151
-
Differentially Private Generative Adversarial Networks for Time Series Continuous, and Discrete Open DataFrigerio, Lorenzo / Oliveira, Anderson Santana de / Gomez, Laurent / Duverger, Patrick et al. | 2019
- 165
-
ESARA: A Framework for Enterprise Smartphone Apps Risk AssessmentHatamian, Majid / Pape, Sebastian / Rannenberg, Kai et al. | 2019
- 180
-
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking ApplicationsMeng, Weizhi / Li, Wenjuan / Jiang, Lijun / Zhou, Jianying et al. | 2019
- 194
-
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users .Simonet, Joëlle / Teufel, Stephanie et al. | 2019
- 209
-
To Be, or Not to Be Notified: Eliciting Privacy Notification Preferences for Online mHealth ServicesMurmann, Patrick / Reinhardt, Delphine / Fischer-Hübner, Simone et al. | 2019
- 223
-
A Structured Comparison of the Corporate Information Security Maturity LevelSchmid, Michael / Pape, Sebastian et al. | 2019
- 238
-
Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills ModelFarooq, Ali / Jeske, Debora / Isoaho, Jouni et al. | 2019
- 253
-
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonymHarborth, David / Cai, Xinyuan / Pape, Sebastian et al. | 2019
- 271
-
Arcana: Enabling Private Posts on Public Microblog PlatformsNarasimman, Anirudh / Wang, Qiaozhi / Li, Fengjun / Lee, Dongwon / Luo, Bo et al. | 2019
- 286
-
Fast Keyed-Verification Anonymous Credentials on Standard Smart CardsCamenisch, Jan / Drijvers, Manu / Dzurenda, Petr / Hajny, Jan et al. | 2019
- 299
-
BlockTag: Design and Applications of a Tagging System for Blockchain AnalysisBoshmaf, Yazan / Jawaheri, Husam Al / Sabah, Mashael Al et al. | 2019
- 314
-
Forward Secure Identity-Based Signature Scheme with RSAKo, Hankyung / Jeong, Gweonho / Kim, Jongho / Kim, Jihye / Oh, Hyunok et al. | 2019
- 331
-
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques.Sayeed, Sarwar / Marco-Gisbert, Hector et al. | 2019
- 345
-
Automatically Proving Purpose Limitation in Software ArchitecturesBavendiek, Kai / Mueller, Tobias / Wittner, Florian / Schwaneberg, Thea / Behrendt, Christian-Alexander / Schulz, Wolfgang / Federrath, Hannes / Schupp, Sibylle et al. | 2019
- 359
-
Commit Signatures for Centralized Version Control SystemsVaidya, Sangat / Torres-Arias, Santiago / Curtmola, Reza / Cappos, Justin et al. | 2019
- 374
-
Towards Contractual Agreements for Revocation of Online DataSchnitzler, Theodor / Dürmuth, Markus / Pöpper, Christina et al. | 2019