Table of Contents
|
Information Security Theory and Practice Samia Bouzefrane, Damien Sauveron |
Front Matter |
SPAWN: Seamless Proximity-Based Authentication by Utilizing the Existent WiFi Environment Philipp Jakubeit, Andreas Peter, Maarten Van Steen |
1-16 |
MQfilTTr: Strengthening Smart Home Privacy Through MQTT Traffic Manipulation Henrich C. Pöhls, Sven Gebauer, Fabian Scharnböck, Korbinian Spielvogel, Joachim Posegga |
17-32 |
Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks Ahmed Khoumsi, Mohammed Erradi, Fahd Adni |
33-48 |
Towards Interconnected Quantum Networks: A Requirements Analysis Swantje Kastrup, Nils Gentschen Felde |
49-63 |
A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog Ahmed Elmarkez, Soraya Mesli-Kesraoui, Flavio Oquendo, Pascal Berruet, Djamal Kesraoui |
64-79 |
Top Cyber Threats: The Rise of Ransomware Amir Djenna, Mohamed Belaoued, Nourdine Lifa |
80-95 |
Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions Pranav Unni, Soumya Banerjee, Samia Bouzefrane |
96-110 |
Security Challenges and Countermeasures in Blockchain’s Peer-to-Peer Architecture Hussein Kazem, Nour El Madhoun, Samia Bouzefrane, Pierrick Conord |
111-127 |
A Bitcoin-Based Digital Identity Model for the Internet of Things Youakim Badr, Xiaoyang Zhu, Samia Bouzefrane, Soumya Banerjee |
128-145 |
Towards a Time-Dependent Approach for User Privacy Expression and Enforcement Nouredine Tamani |
146-161 |
Privacy Preserving Federated Learning: A Novel Approach for Combining Differential Privacy and Homomorphic Encryption Rezak Aziz, Soumya Banerjee, Samia Bouzefrane |
162-177 |
Distributed Backdoor Attacks in Federated Learning Generated by DynamicTriggers Jian Wang, Hong Shen, Xuehua Liu, Hua Zhou, Yuli Li |
178-193 |