While the existence of many security elements can be measured (e.g.,
vul...
In this work, we provide a metric to calculate the most significant soft...
Understanding the landscape of software vulnerabilities is key for devel...
The Common Weakness Enumeration (CWE) is a prominent list of software
we...
Previous work presented a theoretical model based on the implicit Bitcoi...
In this work, we investigate how the governance features of a managed
cu...
Identity management systems (IDMSs) are widely used to provision user
id...
Blockchains are tamper evident and tamper resistant digital ledgers
impl...
Data sent over the Internet can be monitored and manipulated by intermed...
Federated identity management enables users to access multiple systems u...
Blockchain based cryptocurrencies are usually unmanaged, distributed,
co...
Most modern electronic devices can produce a random number. However, it ...