Results 61 to 70 of about 462,961 (193)

Secure hardware IP of GLRT cascade using color interval graph based embedded fingerprint for ECG detector

open access: yesScientific Reports
This paper presents a security aware design methodology to design secure generalized likelihood ratio test (GLRT) hardware intellectual property (IP) core for electrocardiogram (ECG) detector against IP piracy and fraudulent claim of IP ownership threats.
Anirban Sengupta, Aditya Anshul
doaj   +1 more source

A Security Analysis on OpenSIPS

open access: yesIJAIT (International Journal of Applied Information Technology), 2020
IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet.
Gandeva Bayu Satrya   +1 more
doaj   +1 more source

An analysis of security issues in building automation systems [PDF]

open access: yes, 2014
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core   +2 more sources

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

open access: yes, 2015
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies.
Carle, Georg   +4 more
core   +2 more sources

Securing mobile IP enabled laptop

open access: yesThe 11th IEEE International Conference on Networks, 2003. ICON2003., 2004
Abstract Mobile IP Onternet Protocol) enables access to the Internet anywhere with one IP address, hence, providingthe flexibility that is required by today’s growing mobile work force. Deploying Mobile IP introduces newsecurity h a t s that if not carefully addressed can have severe consequences for home organizations.
R. Wiangsripanawan   +2 more
openaire   +2 more sources

Intellectual Property Protection Through Blockchain: Introducing the Novel SmartRegistry-IP for Secure Digital Ownership

open access: yesFuture Internet
The rise of digital content has made the need for reliable and practical intellectual property (IP) management systems more critical than ever. Most traditional IP systems are prone to issues such as delays, inefficiency, and data security breaches. This
Abeer S. Al-Humaimeedy
doaj   +1 more source

A Survey on Future Internet Security Architectures

open access: yesIEEE Access, 2016
Current host-centric Internet Protocol (IP) networks are facing unprecedented challenges, such as network attacks and the exhaustion of IP addresses. Motivated by emerging demands for security, mobility, and distributed networking, many research projects
Wenxiu Ding, Zheng Yan, Robert H. Deng
doaj   +1 more source

Watermarking of Transient Fault-Detectable IP Designs Using Multivariate HLS Scheduling Based Multimodal Security

open access: yesIET Computers & Digital Techniques
Securing reusable hardware intellectual property (IP) cores used in system-on-chip (SoC) designs is crucial, due to global design supply chain that may introduce different points of security vulnerability.
Anirban Sengupta   +3 more
doaj   +1 more source

A Thorough Review of Security in Information-Centric Networking

open access: yesIET Information Security
The rapid evolution of technology has revealed the limitations of host-centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information-centric networking (ICN), which focuses on content (data)
Ado Adamou Abba Ari   +6 more
doaj   +1 more source

APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
EPCglobal network is used to share product data between trading partners, which was proposed by EPCglobal. Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (
Wei Ren, Liangli Ma, Yi Ren
doaj   +1 more source

Home - About - Disclaimer - Privacy