Results 51 to 60 of about 8,344 (213)

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks

open access: yesIEEE Access
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi   +2 more
doaj   +1 more source

The Impact of Cyberattacks on Efficient Operations of CAVs

open access: yesFrontiers in Future Transportation, 2022
The implementation of connected and automated vehicles promises increased safety and efficiency by leveraging advances in technology. With this new technology, some vulnerabilities could lead to cyberattacks.
Ian McManus, Kevin Heaslip
doaj   +1 more source

Integrating Digital Twins, Data Management and Artificial Intelligence for Predictive Maintenance in Aviation: A Comprehensive Review

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
This study provides a comprehensive review of predictive maintenance in aviation, emphasising the integration of digital twin technology, engineering data management and AI algorithms. It highlights how data‐driven approaches enhance safety, reduce costs and improve aircraft reliability through real‐time monitoring, fault detection and remaining useful
Saber Mehdipour   +6 more
wiley   +1 more source

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes

open access: yesIEEE Access, 2023
One of the significant post-quantum cryptographic candidates is the NTRU public key cryptosystem. It operates on polynomial rings, where the parameter largely determines the security of the system.
Alla Levina   +2 more
doaj   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Survey and Systematization of Secure Device Pairing

open access: yes, 2017
Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices.
Fomichev, Mikhail   +4 more
core   +1 more source

On the Security of Ultrasound as Out-of-band Channel [PDF]

open access: yes, 2007
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication based on inherent limitations in signal propagation, and can additionally be ...
Gellersen, Hans, Mayrhofer, Rene
core   +1 more source

Home - About - Disclaimer - Privacy