Results 31 to 40 of about 409,625 (195)

An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones

open access: yesDrones, 2022
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drones, on the other
Sana Javed   +6 more
doaj   +1 more source

Bitcoin over Tor isn't a good idea [PDF]

open access: yes, 2014
Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging
Biryukov, Alex, Pustogarov, Ivan
core   +4 more sources

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY
ABSTRACTThis article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
openaire   +2 more sources

Enhancing Security in International Data Spaces: A STRIDE Framework Approach

open access: yesTechnologies
The proliferation of Internet of Things (IoT) devices and big data has catalyzed the emergence of data markets. Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while ...
Nikola Gavric   +4 more
doaj   +1 more source

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between
S.K. Hafizul Islam   +5 more
doaj   +1 more source

Integrated Distributed Authentication Protocol for Smart Grid Communications [PDF]

open access: yes, 2018
In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.
Choi, B.J., Saxena, N.
core   +3 more sources

Tool for the Analysis of Network Wireless Security [PDF]

open access: yes, 2014
Tato práce se zabývá bezpečností bezdrátových sítí a počítačovými útoky. Obsahuje popis různých zabezpečení sítí, nejznámějších útoků a nástrojů, kterými jsou útoky proveditelné.
Šenovský, Jakub
core  

Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves

open access: yes, 2017
Intel Software Guard Extension (SGX) offers software applications enclave to protect their confidentiality and integrity from malicious operating systems.
Almeida José Bacelar   +18 more
core   +1 more source

Limitations of IEC62351-3's public key management [PDF]

open access: yes, 2016
The ISO/IEC 62351 standard provides a set of security controls and protocols for communications in smart grids based on the ISO/IEC 60870, 61850, and DNP3 standards. It offers the protection goals of confidentiality, integrity, and authentication.
Wolthusen, Stephen, Wright, James
core   +1 more source

Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals [PDF]

open access: yes, 2012
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM needs to trust that (a) all communications are indeed carried out with the intended terminal, (b) such communications are confidential, and (c) the terminal’s integrity is guaranteed.
Alpár, G., Hoepman, J.H.
openaire   +4 more sources

Home - About - Disclaimer - Privacy