Quantcast
Channel: CPS-VO - protocol
Browsing all 47 articles
Browse latest View live

Secure object tracking protocol for Networked RFID Systems

Ray, B., Howdhury, M., Abawajy, J., Jesmin, M..  2015.  Secure object tracking protocol for Networked RFID Systems. 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial...

View Article


LADP: A lightweight authentication and delegation protocol for RFID tags

Li, Gaochao, Xu, Xiaolin, Li, Qingshan.  2015.  LADP: A lightweight authentication and delegation protocol for RFID tags. 2015 Seventh International Conference on Ubiquitous and Future Networks. :860–865.

View Article


Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk

Fournet, Cédric.  2016.  Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk. Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security. :89–89.

View Article

CRII: SaTC: Analyzing and verifying the security of TCP stacks under...

The objective of this project is to strengthen the Transmission Control Protocol (TCP), a ubiquitous core Internet protocol, under emerging threat models to make it robust and secure enough to serve...

View Article

TWC: Small: Collaborative: Multipath TCP Side Channel Vulnerabilities and...

The objective of this project is to understand and strengthen the security of Multipath TCP (MPTCP) - an IETF standardized suite of TCP extensions that allow one MPTCP connection, consisting of...

View Article


Review on RFID Identity Authentication Protocols Based on Hash Function

Bing, Y., Baolong, L., Hua, C..  2017.  Review on RFID Identity Authentication Protocols Based on Hash Function. 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA)....

View Article

A lightweight RFID authentication protocol with confidentiality and anonymity

Shi, Z., Chen, J., Chen, S., Ren, S..  2017.  A lightweight RFID authentication protocol with confidentiality and anonymity. 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation...

View Article

SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor...

Ulz, T., Pieber, T., Steger, C., Lesjak, C., Bock, H., Matischek, R..  2017.  SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration. 2017 IEEE International Conference on...

View Article


Attack scenarios and security analysis of MQTT communication protocol in IoT...

Andy, S., Rahardjo, B., Hanindhito, B..  2017.  Attack scenarios and security analysis of MQTT communication protocol in IoT system. 2017 4th International Conference on Electrical Engineering,...

View Article


Optimized event notification in CAN through in-frame replies and Bloom filters

G. Bloom, G. Cena, I. C. Bertolotti, T. Hu, A. Valenzano.  2017.  Optimized event notification in CAN through in-frame replies and Bloom filters. 2017 IEEE 13th International Workshop on Factory...

View Article

Continuous Biometric Verification for Non-Repudiation of Remote Services

Schiavone, E., Ceccarelli, A., Bondavalli, A..  2017.  Continuous Biometric Verification for Non-Repudiation of Remote Services. Proceedings of the 12th International Conference on Availability,...

View Article

Specification, Design, and Verification of an Accountability-aware...

Antignac, Thibaud, Mukelabai, Mukelabai, Schneider, Gerardo.  2017.  Specification, Design, and Verification of an Accountability-aware Surveillance Protocol. Proceedings of the Symposium on Applied...

View Article

A review of black-hole attack mitigation techniques and its drawbacks in...

Gurung, S., Chauhan, S..  2017.  A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network. 2017 International Conference on Wireless Communications, Signal...

View Article


A New Version of Kerberos Authentication Protocol Using ECC and Threshold...

Sutradhar, M. R., Sultana, N., Dey, H., Arif, H..  2018.  A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security. 2018 Joint 7th International...

View Article

A Cryptographic Look at Multi-party Channels

Eugster, P., Marson, G. A., Poettering, B..  2018.  A Cryptographic Look at Multi-party Channels. 2018 IEEE 31st Computer Security Foundations Symposium (CSF). :31–45.

View Article


Analytical Study on Mobile Ad Hoc Networks for IPV6

Jain, Jay Kumar, Chauhan, Dipti.  2019.  Analytical Study on Mobile Ad Hoc Networks for IPV6. 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). :1–6.

View Article

Research of Secure Communication of Esp32 IoT Embedded System to.NET Core...

Nikolov, Neven, Nakov, Ognyan.  2019.  Research of Secure Communication of Esp32 IoT Embedded System to.NET Core Cloud Structure Using MQTTS SSL/TLS. 2019 IEEE XXVIII International Scientific...

View Article


Features of Application of Data Transmission Protocols in Wireless Networks...

Belej, Olexander, Nestor, Natalia, Polotai, Orest, Sadeckii, Jan.  2019.  Features of Application of Data Transmission Protocols in Wireless Networks of Sensors. 2019 3rd International Conference on...

View Article

Authentication Protocols Based on One-Time Passwords

Babkin, Sergey, Epishkina, Anna.  2019.  Authentication Protocols Based on One-Time Passwords. 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)....

View Article

CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain...

Rumez, Marcel, Dürrwang, Jürgen, Brecht, Tim, Steinshorn, Timo, Neugebauer, Peter, Kriesten, Reiner, Sax, Eric.  2019.  CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain...

View Article
Browsing all 47 articles
Browse latest View live