Results 71 to 80 of about 409,625 (195)

Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things

open access: yes, 2017
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core   +1 more source

Position Spoofing Attacks on Unmanned Surface Vehicles

open access: yesJournal of Marine Science and Engineering
Unmanned surface vehicles (USVs) are equipped with numerous sensors, and data is transmitted through networks. Attackers may remotely compromise unmanned surface vehicle (USV) systems and commit criminal acts via networks, causing USVs to deviate from ...
Jia Wang   +3 more
doaj   +1 more source

Man-In-The-Middle Attacks Targeting Quantum Cryptography

open access: yes2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT)
The development of the Willow quantum chip by Google has sparked significant interest in quantum computing, ushering in a new wave of advancements in the field. As quantum computing technology continues to mature, secure quantum communication has garnered increasing attention.
openaire   +2 more sources

A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge

open access: yesJurnal Nasional Pendidikan Teknik Informatika (JANAPATI)
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida   +5 more
doaj   +1 more source

Integrating blockchain with lattice-based cryptography for privacy-preserving and quantum-secure smart grid communications

open access: yesFrontiers in Physics
The Smart Grid (SG) is an upgraded electrical system integrated with Information and Communication Technology (ICT) to provide two-way data exchange between power consumers and manufacturers.
Umair Habib   +4 more
doaj   +1 more source

Attack Detection in Sensor Network Target Localization Systems with Quantized Data

open access: yes, 2017
We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center.
Blum, Rick S.   +3 more
core   +1 more source

Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices

open access: yesIEEE Access, 2019
The Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network.
Sarmadullah Khan   +4 more
doaj   +1 more source

Spoiled Onions: Exposing Malicious Tor Exit Relays

open access: yes, 2014
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core  

A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis

open access: yesInformation
Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training.
Eman Shalabi   +3 more
doaj   +1 more source

Deniable Authentication Protocol Resisting Man-In-The-Middle Attack

open access: yes, 2007
Deniable authentication is a new protocol which not only enables a receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. The proposed protocol in this paper makes use of bilinear pairings over elliptic curves, as well as the Diffie-Hellman key exchange protocol.
Han, Song, Wanquan Liu, Chang, Elizabeth
openaire   +1 more source

Home - About - Disclaimer - Privacy