Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
The Domain Name System (DNS) is a fundamental component of today’s Internet. Recent years have seen radical changes to DNS with increases in usage of remote DNS and public DNS s...