Quantcast
Channel: CPS-VO - protocol
Browsing latest articles
Browse All 47 View Live

Chen_Declarative_Access_JA.pdf

View Article


"Caesar: high-speed and memory-efficient forwarding engine for future...

M. Moradi, F. Qian, Q. Xu, Z. M. Mao, D. Bethea, M. K. Reiter.  2015.  "Caesar: high-speed and memory-efficient forwarding engine for future internet architecture". 2015 ACM/IEEE Symposium on...

View Article


Cryptanalysis and improvement of two RFID-OT protocols based on quadratic...

Jin, Y., Zhu, H., Shi, Z., Lu, X., Sun, L..  2015.  Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. 2015 IEEE International Conference on Communications (ICC)....

View Article

Secure object tracking protocol for Networked RFID Systems

Ray, B., Howdhury, M., Abawajy, J., Jesmin, M..  2015.  Secure object tracking protocol for Networked RFID Systems. 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial...

View Article

LADP: A lightweight authentication and delegation protocol for RFID tags

Li, Gaochao, Xu, Xiaolin, Li, Qingshan.  2015.  LADP: A lightweight authentication and delegation protocol for RFID tags. 2015 Seventh International Conference on Ubiquitous and Future Networks. :860–865.

View Article


Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk

Fournet, Cédric.  2016.  Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk. Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security. :89–89.

View Article

CRII: SaTC: Analyzing and verifying the security of TCP stacks under...

The objective of this project is to strengthen the Transmission Control Protocol (TCP), a ubiquitous core Internet protocol, under emerging threat models to make it robust and secure enough to serve...

View Article

TWC: Small: Collaborative: Multipath TCP Side Channel Vulnerabilities and...

The objective of this project is to understand and strengthen the security of Multipath TCP (MPTCP) - an IETF standardized suite of TCP extensions that allow one MPTCP connection, consisting of...

View Article


Review on RFID Identity Authentication Protocols Based on Hash Function

Bing, Y., Baolong, L., Hua, C..  2017.  Review on RFID Identity Authentication Protocols Based on Hash Function. 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA)....

View Article


A lightweight RFID authentication protocol with confidentiality and anonymity

Shi, Z., Chen, J., Chen, S., Ren, S..  2017.  A lightweight RFID authentication protocol with confidentiality and anonymity. 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation...

View Article

SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor...

Ulz, T., Pieber, T., Steger, C., Lesjak, C., Bock, H., Matischek, R..  2017.  SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration. 2017 IEEE International Conference on...

View Article

Attack scenarios and security analysis of MQTT communication protocol in IoT...

Andy, S., Rahardjo, B., Hanindhito, B..  2017.  Attack scenarios and security analysis of MQTT communication protocol in IoT system. 2017 4th International Conference on Electrical Engineering,...

View Article

Optimized event notification in CAN through in-frame replies and Bloom filters

G. Bloom, G. Cena, I. C. Bertolotti, T. Hu, A. Valenzano.  2017.  Optimized event notification in CAN through in-frame replies and Bloom filters. 2017 IEEE 13th International Workshop on Factory...

View Article


Continuous Biometric Verification for Non-Repudiation of Remote Services

Schiavone, E., Ceccarelli, A., Bondavalli, A..  2017.  Continuous Biometric Verification for Non-Repudiation of Remote Services. Proceedings of the 12th International Conference on Availability,...

View Article

Specification, Design, and Verification of an Accountability-aware...

Antignac, Thibaud, Mukelabai, Mukelabai, Schneider, Gerardo.  2017.  Specification, Design, and Verification of an Accountability-aware Surveillance Protocol. Proceedings of the Symposium on Applied...

View Article


A review of black-hole attack mitigation techniques and its drawbacks in...

Gurung, S., Chauhan, S..  2017.  A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network. 2017 International Conference on Wireless Communications, Signal...

View Article

A New Version of Kerberos Authentication Protocol Using ECC and Threshold...

Sutradhar, M. R., Sultana, N., Dey, H., Arif, H..  2018.  A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security. 2018 Joint 7th International...

View Article


A Cryptographic Look at Multi-party Channels

Eugster, P., Marson, G. A., Poettering, B..  2018.  A Cryptographic Look at Multi-party Channels. 2018 IEEE 31st Computer Security Foundations Symposium (CSF). :31–45.

View Article

Analytical Study on Mobile Ad Hoc Networks for IPV6

Jain, Jay Kumar, Chauhan, Dipti.  2019.  Analytical Study on Mobile Ad Hoc Networks for IPV6. 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). :1–6.

View Article

Research of Secure Communication of Esp32 IoT Embedded System to.NET Core...

Nikolov, Neven, Nakov, Ognyan.  2019.  Research of Secure Communication of Esp32 IoT Embedded System to.NET Core Cloud Structure Using MQTTS SSL/TLS. 2019 IEEE XXVIII International Scientific...

View Article

Features of Application of Data Transmission Protocols in Wireless Networks...

Belej, Olexander, Nestor, Natalia, Polotai, Orest, Sadeckii, Jan.  2019.  Features of Application of Data Transmission Protocols in Wireless Networks of Sensors. 2019 3rd International Conference on...

View Article


Authentication Protocols Based on One-Time Passwords

Babkin, Sergey, Epishkina, Anna.  2019.  Authentication Protocols Based on One-Time Passwords. 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)....

View Article


CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain...

Rumez, Marcel, Dürrwang, Jürgen, Brecht, Tim, Steinshorn, Timo, Neugebauer, Peter, Kriesten, Reiner, Sax, Eric.  2019.  CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain...

View Article

Decentralized Identifier Distribution for Moving Target Defense and Beyond

Krohmer, D., Schotten, H. D..  2020.  Decentralized Identifier Distribution for Moving Target Defense and Beyond. 2020 International Conference on Cyber Situational Awareness, Data Analytics and...

View Article

Research of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for...

Nikolov, N..  2020.  Research of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for Embedded Systems. 2020 XXIX International Scientific Conference Electronics (ET). :1—4.

View Article


An Enhanced and Secure Multiserver-based User Authentication Protocol

Hassan, Mehmood, Sultan, Aiman, Awan, Ali Afzal, Tahir, Shahzaib, Ihsan, Imran.  2020.  An Enhanced and Secure Multiserver-based User Authentication Protocol. 2020 International Conference on Cyber...

View Article

Security Analysis on an Efficient and Provably Secure Authenticated Key...

Shamshad, Salman, Obaidat, Mohammad S., Minahil, Saleem, Muhammad Asad, Shamshad, Usman, Mahmood, Khalid.  2021.  Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement...

View Article

Data Obfuscation Technique in Cloud Security

Enireddy, Vamsidhar, Somasundaram, K., Mahesh M, P. C. Senthil, Ramkumar Prabhu, M., Babu, D. Vijendra, C, Karthikeyan..  2021.  Data Obfuscation Technique in Cloud Security. 2021 2nd International...

View Article

Analysis of information security in the PoW (Proof of Work) and PoS (Proof of...

Chicaiza, Silvana Abigail Yacchirema, Chafla, Ciro Napoleon Saguay, Álvarez, Luis Fernando Enriquez, Matute, Polo Fabian Iñiguez, Rodriguez, Ramiro Delgado.  2021.  Analysis of information security in...

View Article



On the Security of Authenticated Key Agreement Scheme for Fog-driven IoT...

Shamshad, Salman, Obaidat, Mohammad S., Minahil, Shamshad, Usman, Noor, Sahar, Mahmood, Khalid.  2021.  On the Security of Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System. 2021...

View Article
Browsing latest articles
Browse All 47 View Live