Results 71 to 80 of about 13,174 (191)

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza   +4 more
wiley   +1 more source

Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks

open access: yesCryptography
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process.
Zeeshan Ashraf   +2 more
doaj   +1 more source

Automatic analysis of distance bounding protocols [PDF]

open access: yes, 2009
Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in ...
Bruhadeshwar, Bezawada   +2 more
core  

InternalBlue - Bluetooth Binary Patching and Experimentation Framework

open access: yes, 2019
Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol ...
Bluetooth Core Bluetooth SIG.   +8 more
core   +1 more source

Attack Resilient Microgrid: Impact Characterisation, Online Anomaly Detection and Mitigation

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
This paper proposes an attack‐resilient control framework for grid‐connected microgrids that enable real‐time detection and mitigation of stealthy cyber‐physical attacks on control and measurement signals. Using an online LSTM‐based anomaly detection system and a model‐based mitigation strategy, the framework maintains near‐optimal performance even ...
Nazmus Saqib   +3 more
wiley   +1 more source

Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity

open access: yesCryptography, 2018
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability— ...
James Jin Kang   +2 more
doaj   +1 more source

Impact of Cyberphysical Attacks on Load Tap Changers and Distribution System Voltage Stability

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
In this paper, we analysed the impact of a cyberphysical attack manipulating the operation of the LTC. In addition, we analysed the effect of load drop and PV while LTC is being manipulated. The cyber vulnerabilities leading to the attack were explored. ABSTRACT Load tap changers (LTCs) play a critical role in voltage regulation, and their manipulation
Anas AlMajali   +4 more
wiley   +1 more source

Beyond the Hype: On Using Blockchains in Trust Management for Authentication

open access: yes, 2017
Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting.
Alexopoulos, Nikolaos   +3 more
core   +1 more source

Simplified MITM Modeling for Permutations: New (Quantum) Attacks

open access: yes, 2022
Meet-in-the-middle (MITM) is a general paradigm where internal states are computed along two independent paths ('forwards' and 'backwards') that are then matched. Over time, MITM attacks improved using more refined techniques and exploiting additional freedoms and structure, which makes it more involved to find and optimize such attacks.
Schrottenloher, André, Stevens, Marc
openaire   +1 more source

Home - About - Disclaimer - Privacy