Machine Learning and Knowledge Extraction
7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 – September 1, 2023, Proceedings
Chapter
This chapter on Security and Privacy builds on two aspects central to digital humanism: (1) self-determination and (2) humans in the center.
Chapter and Conference Paper
The term miner extractable value (MEV) has been coined to describe the value which can be extracted by a miner, e.g., from manipulating the order of transactions within a given timeframe.
Chapter and Conference Paper
The release of ChatGPT to the general public has sparked discussions about the dangers of artificial intelligence (AI) among the public. The European Commission’s draft of the AI Act has further fueled these d...
Chapter and Conference Paper
This paper studies users’ privacy perceptions of UTXO-based blockchains such as Bitcoin. It elaborates – based on interviews and questionnaires – on a mental model of employing privacy-preserving techniques fo...
Book and Conference Proceedings
7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 – September 1, 2023, Proceedings
Chapter and Conference Paper
The term ‘translational research’ is traditionally applied to medicine referring to a transfer of scientific results into practice, namely from ‘bench to bedside’. Only in recent years there have been attempts...
Book and Conference Proceedings
6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers
Chapter and Conference Paper
Today, children have access to the Internet from an early age and are therefore considered digital natives. This paper investigates how children (aged five to eight) and their parents perceive and deal with th...
Book and Conference Proceedings
6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022, Vienna, Austria, August 23–26, 2022, Proceedings
Chapter and Conference Paper
HTTPS has been the standard for securing online communications for over 20 years. Despite the availability of tools to make the configuration process easier (e.g., Let’s Encrypt, Certbot), SSL Pulse scans show...
Chapter and Conference Paper
In this paper, we outline a novel form of attack we refer to as Opportunistic Algorithmic Double-Spending (OpAl). OpAl attacks avoid equivocation, i.e., do not require conflicting transactions, and are carried ou...
Chapter and Conference Paper
Over the years, several privacy attacks targeted at UTXO-based cryptocurrencies such as Bitcoin have been proposed. This has led to an arms race between increasingly sophisticated analysis approaches and a con...
Book and Conference Proceedings
5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17–20, 2021, Proceedings
Chapter and Conference Paper
The main driver of the digital transformation currently underway is undoubtedly artificial intelligence (AI). The potential of AI to benefit humanity and its environment is undeniably enormous. AI can definite...
Chapter and Conference Paper
In this paper we extend the attack landscape of bribing attacks on cryptocurrencies by presenting a new method, which we call Pay-To-Win (P2W). To the best of our knowledge, it is the first approach capable of fa...
Chapter and Conference Paper
The Bitcoin blockchain was the first publicly verifiable, and distributed ledger, where it is possible for everyone to download and check the full history of all data records from the genesis block. These prop...
Chapter
This chapter consists of several sections which contain contributions from members of IFIP Technical Committee 8 (Information Systems). We highlight the accomplishments of Technical Committee 8 (TC8) and its w...
Chapter and Conference Paper
A long standing question in the context of cryptocurrencies based on Nakamoto consensus is whether such constructions are incentive compatible, i.e., the intended properties of the system emerge from the appro...
Chapter and Conference Paper
Tor provides anonymity to millions of users around the globe, which has made it a valuable target for malicious actors. As a low-latency anonymity system, it is vulnerable to traffic correlation attacks from s...
Book and Conference Proceedings
4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25–28, 2020, Proceedings