default search action
11th NTMS 2021: Paris, France
- 11th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2021, Paris, France, April 19-21, 2021. IEEE 2021, ISBN 978-1-6654-4399-9
- Bruno de Azevedo Mendonça, Paulo Matias:
Auditchain: a mechanism for ensuring logs integrity based on proof of existence in a public blockchain. 1-5 - Danai Chasaki, Christopher Mansour:
SDN Security through System Call Learning. 1-6 - Vihara Fernando:
Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges. 1-7 - Har Preet Singh, Kyriakos Stefanidis, Fabian Kirstein:
A Private Key Recovery Scheme Using Partial Knowledge. 1-5 - Sudarshan Parthasarathy, Akash Harikrishnan, Gautam Narayanan, Lohith J. J, Kunwar Singh:
Secure Distributed Medical Record Storage using Blockchain and Emergency Sharing Using Multi-Party Computation. 1-5 - Jens Schlumberger, Stefan Wildermann, Jürgen Teich:
CORSICA: A Framework for Conducting Real-World Side-Channel Analysis. 1-5 - Viddi Mardiansyah, Riri Fitri Sari:
Implementation of Proof-of-Work Concept Algorithm using SimBlock Simulator. 1-6 - Farah Haidar, Farah Braiteh, Brigitte Lonc, Arnaud Kaiser, Pascal Urien:
Performance Evaluation of Pseudonym Reload over Cellular Technology. 1-4 - Mouhamad Almakhour, Ayoub Wehby, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk:
Smart Contract Based Solution for Secure Distributed SDN. 1-6 - Iacovos Ioannou, Christophoros Christophorou, Vasos Vassiliou, Andreas Pitsillides:
Performance Evaluation of Transmission Mode Selection in D2D communication. 1-7 - Chandan Kumar Sheemar, Dirk T. M. Slock:
Massive MIMO mmWave Full Duplex Relay for IAB with Limited Dynamic Range. 1-5 - Johannes Goltz:
Securing Building Automation Systems. 1-7 - Robert Sutton, Robert Ludwiniak, Nikolaos Pitropakis, Christos Chrysoulas, Tasos Dagiuklas:
Towards An SDN Assisted IDS. 1-5 - Christos Bouras, Apostolos Gkamas, Spyridon Aniceto Katsampiris Salgado:
Exploring the energy efficiency for Search and Rescue operations over LoRa. 1-5 - Volkan Sevindik:
Blockchain based Resource Tokenization for Crowdfunding of Wireless Network Investment. 1-5 - Farkhund Iqbal, Michal Motylinski, Áine MacDermott:
Discord Server Forensics: Analysis and Extraction of Digital Evidence. 1-8 - Rayner Gomes, Dario Vieira, Miguel Franklin de Castro:
Differential Evolution for VNE-5G Scenarios. 1-6 - Daniel Alejandro Maldonado-Ruiz, Jenny Torres, Nour El Madhoun, Mohamad Badra:
An Innovative and Decentralized Identity Framework Based on Blockchain Technology. 1-8 - Konstantinos Tsioutas, George Xylomenos, Ioannis Doumanis:
An empirical evaluation of QoME for NMP. 1-5 - Jasmin Cosic, Christian Schlehuber, Drazen Morog:
Digital Forensic Investigation Process in Railway Environment. 1-6 - Lorenzo Vangelista, Alessandro Cattapan:
Extending the Lora modulation to add parallel channels and improve the LoRaWAN network performance. 1-5 - Christiano A. P. Rodrigues, Dario Vieira, Miguel F. de Castro:
5G Network Slice - A URLLC Resource Allocation Perspective. 1-5 - Bandar Alamri, Ibrahim Tariq Javed, Tiziana Margaria:
A GDPR-Compliant Framework for IoT-Based Personal Health Records Using Blockchain. 1-5 - Faik Kerem Örs, Mustafa Aydin, Aysu Bogatarkan, Albert Levi:
Scalable Wi-Fi Intrusion Detection for IoT Systems. 1-6 - Monika Di Angelo, Gernot Salzer:
Towards the Identification of Security Tokens on Ethereum. 1-5 - Gaurav Sharma, Denis Verstraeten, Vishal Saraswat, Jean-Michel Dricot, Olivier Markowitch:
Anonymous Fair Auction on Blockchain. 1-5 - Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendörfer:
FFT based Horizontal SCA Attack against ECC. 1-5 - Benjamin Yankson, Javed Vali K, Patrick C. K. Hung, Farkhund Iqbal, Liaqat Ali Khan:
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks. 1-7 - Patrick Karl, Michael Gruber:
A Survey on the Application of Fault Analysis on Lightweight Cryptography. 1-3 - Mohamed Nassar, Joseph Khoury, Abdelkarim Erradi, Elias Bou-Harb:
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems. 1-7 - Iman Dernayka, Ali Chehab:
Blockchain Development Platforms: Performance Comparison. 1-6 - Zeeshan Ali Khan, Peter Herrmann:
Energy-efficient Protection of IoT Networks using Trust Management on the IEEE 802.15.4 Protocol. 1-7 - Mohamad Badra, Rouba Borghol:
Privacy-Preserving and Efficient Aggregation for Smart Grid based on Blockchain. 1-3 - Areej Almazroa, Hongjian Sun:
An Internet of Things (IoT) Homecare Management System Using Cardiac Arrhythmia Classification. 1-5 - Joon Sern Lee, Yam Gui Peng David:
TypoSwype: An Imaging Approach to Detect Typo-Squatting. 1-5 - Mouad Fakhri, Baptiste Zegre, Nouha Omrane, Rakia Jaziri:
SpeedChain: A framework for Monitoring and Alerting blockchain projects. 1-5 - Natkamon Tovanich, Nicolas Soulié, Petra Isenberg:
Visual Analytics of Bitcoin Mining Pool Evolution: On the Road Toward Stability? 1-5 - Lin Zhang, Brian Lee, Yuhang Ye, Yuansong Qiao:
Evaluation of Ethereum End-to-end Transaction Latency. 1-5 - Waqas Ahmed, Faisal Shahzad, Abdul Rehman Javed, Farkhund Iqbal, Liaqat Ali Khan:
WhatsApp Network Forensics: Discovering the IP Addresses of Suspects. 1-7 - Vladimir Gustov, Alla Levina:
Electromagnetic Fields as a Sign of Side-Channel Attacks in GSM Module. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.