64   Artículos

« Anterior     Página: 1 de 4     Siguiente »

 
en línea
Maram Fahaad Almufareh and Mamoona Humayun    
Security and performance (SAP) are two critical NFRs that affect the successful completion of software projects. Organizations need to follow the practices that are vital to SAP verification. These practices must be incorporated into the software develop... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Maki Kihara and Satoshi Iriyama    
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp... ver más
Revista: Information    Formato: Electrónico

 
en línea
Marisol García-Valls and Alejandro M. Chirivella-Ciruelos    
The lack of sufficient guarantee about the authenticity of running smart contracts is a major entry barrier to blockchain networks. By authenticity,we refer to the smart contract ownership or provenance; this implies perfect matching between a published ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yu-Sheng Yang, Shih-Hsiung Lee, Wei-Che Chen, Chu-Sing Yang, Yuen-Min Huang and Ting-Wei Hou    
The advanced connection requirements of industrial automation and control systems have sparked a new revolution in the Industrial Internet of Things (IIoT), and the Supervisory Control and Data Acquisition (SCADA) network has evolved into an open and hig... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Anant Sujatanagarjuna, Arne Bochem and Benjamin Leiding    
Protocol flaws such as the well-known Heartbleed bug, security and privacy issues or incomplete specifications, in general, pose risks to the direct users of a protocol and further stakeholders. Formal methods, such as Colored Petri Nets (CPNs), facilita... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xiaojuan Chen and Huiwen Deng    
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jing Chen, Tong Li and Rui Zhu    
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Giriraj Sharma, Amit M. Joshi and Saraju P. Mohanty    
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to var... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tao Feng, Chengfan Liu, Xiang Gong and Ye Lu    
The integration of buses in industrial control systems, fueled by advancements such as the Internet of Things (IoT), has led to their widespread adoption, significantly enhancing operational efficiency. However, with the increasing interconnection of sys... ver más
Revista: Information    Formato: Electrónico

 
en línea
Donatas Ma?eika and Rimantas Butleris    
This paper presents how Model-Based System Engineering (MBSE) could be leveraged in order to mitigate security risks at an early stage of system development. Primarily, MBSE was used to manage complex engineering projects in terms of system requirements,... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Meriem Houmer,Mariya Ouaissa,Mariyam Ouaissa,Moulay Lahcen Hasnaoui     Pág. pp. 48 - 64
In Intelligent Transport Systems (ITS), Vehicular Ad-hoc Networks (VANET) play an essential role in improving road safety and traffic efficiency. Nevertheless, due to its special characteristics like high mobility, large size of the network and dynamic t... ver más

 
en línea
Fabian Honecker, Julian Dreyer and Ralf Tönjes    
Modern Public Key Infrastructures (PKIs) allow users to create and maintain centrally stored cryptographic certificates. These infrastructures use a so-called certificate chain. At the root of the chain, a root Certification Authority (CA) is responsible... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
S. Velliangiri, P. Karthikeyan, Vinayakumar Ravi, Meshari Almeshari and Yasser Alzamil    
Medical service providers generate many healthcare records containing sensitive and private information about a patient?s health. The patient can allow healthcare service providers to generate healthcare data, which can be stored with healthcare service ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany    
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yongbo Jiang, Gongxue Sun and Tao Feng    
With the increasing value of various kinds of data in the era of big data, the demand of different subjects for data transactions has become more and more urgent. In this paper, a blockchain-based data transaction protection scheme is proposed to realize... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yongbo Jiang, Juncheng Lu and Tao Feng    
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of i... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman and Rafiqul Islam    
Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhihao Wang, Ru Huo and Shuo Wang    
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security. This means that smart grids need a new key management method that is safe and efficient ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ahlam Fakieh and Aymen Akremi    
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nikos Fotiou and George C. Polyzos    
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »