Results 31 to 40 of about 409,625 (195)
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drones, on the other
Sana Javed +6 more
doaj +1 more source
Bitcoin over Tor isn't a good idea [PDF]
Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging
Biryukov, Alex, Pustogarov, Ivan
core +4 more sources
IoT and Man‐in‐the‐Middle Attacks
ABSTRACTThis article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
openaire +2 more sources
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
The proliferation of Internet of Things (IoT) devices and big data has catalyzed the emergence of data markets. Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while ...
Nikola Gavric +4 more
doaj +1 more source
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between
S.K. Hafizul Islam +5 more
doaj +1 more source
Integrated Distributed Authentication Protocol for Smart Grid Communications [PDF]
In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.
Choi, B.J., Saxena, N.
core +3 more sources
Tool for the Analysis of Network Wireless Security [PDF]
Tato práce se zabývá bezpečností bezdrátových sítí a počítačovými útoky. Obsahuje popis různých zabezpečení sítí, nejznámějších útoků a nástrojů, kterými jsou útoky proveditelné.
Šenovský, Jakub
core
Intel Software Guard Extension (SGX) offers software applications enclave to protect their confidentiality and integrity from malicious operating systems.
Almeida José Bacelar +18 more
core +1 more source
Limitations of IEC62351-3's public key management [PDF]
The ISO/IEC 62351 standard provides a set of security controls and protocols for communications in smart grids based on the ISO/IEC 60870, 61850, and DNP3 standards. It offers the protection goals of confidentiality, integrity, and authentication.
Wolthusen, Stephen, Wright, James
core +1 more source
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals [PDF]
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM needs to trust that (a) all communications are indeed carried out with the intended terminal, (b) such communications are confidential, and (c) the terminal’s integrity is guaranteed.
Alpár, G., Hoepman, J.H.
openaire +4 more sources

