Results 21 to 30 of about 462,961 (193)
The Security of IP-Based Video Surveillance Systems
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home.
Naor Kalbo +3 more
doaj +1 more source
Protecting SOME/IP Communication via Authentication Ticket
Designed using vehicle requirements, Scalable service-Oriented MiddlewarE over IP (SOME/IP) has been adopted and used as one of the Ethernet communication standard protocols in the AUTomotive Open System Architecture (AUTOSAR).
Seulhui Lee, Wonsuk Choi, Dong Hoon Lee
doaj +1 more source
METHODS FOR ENHANCING SECURITY IN IP TELEPHONY
Background. The widespread adoption of IP telephony in corporate and operator networks has led to an increased risk of cyber threats such as fraud, eavesdropping, service interruptions and unauthorised access.
Serhii Fedorov, Rina Novogrudskaya
doaj +1 more source
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from ...
HyungJun Kim
doaj +1 more source
Network architecture with intrinsic security
IP network brings big benefits for human’s life by connecting most devices all over the world,but its security and privacy issues make people frustrating when using end to end communication.Without intrinsic security design of the network,it is difficult
Weiyu JIANG, Bingyang LIU, Chuang WANG
doaj +2 more sources
An n-sided polygonal model to calculate the impact of cyber security events [PDF]
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP ...
F Cuppens +6 more
core +2 more sources
Intellectual Property (IP) includes ideas, innovations, methodologies, works of authorship (viz., literary and artistic works), emblems, brands, images, etc. This property is intangible since it is pertinent to the human intellect. Therefore, IP entities
Ashraful Tauhid +3 more
doaj +1 more source
Cryptographically Secure Shield for Security IPs Protection [PDF]
Probing attacks are serious threats on integrated circuits. Security products often include a protective layer called shield that acts like a digital fence. In this article, we demonstrate a new shield structure that is cryptographically secure. This shield is based on the lightweight block cipher and independent mesh lines to ensure the security ...
Ngo, Xuan Thuy +6 more
openaire +2 more sources
SIM: a secure IP protocol for MANET
According to the core logic of IP Sec, a secure IP protocol was proposed for Mobile Ad Hoc network. Security deal to the packets in and out of the network protocol stack was done by adding a transparent secure layer between trans-port-layer and link ...
Rong-sen LI, Wen-hua DOU
doaj +2 more sources
Complexity and Unwinding for Intransitive Noninterference [PDF]
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian +3 more
core

