Articles with "security analysis" as a keyword



Security analysis of the Wi-Fi Easy Connect

Sign Up to like & get
recommendations!
Published in 2025 at "International Journal of Information Security"

DOI: 10.1007/s10207-025-00988-3

Abstract: Wi-Fi Easy Connect is a protocol introduced by the Wi-Fi Alliance, as the core replacement of the Wi-Fi Protected Setup (WPS). It aims to facilitate user-friendly provisioning methods, such as scanning a QR code, or… read more here.

Keywords: security; easy connect; analysis easy; security analysis ... See more keywords
Photo from archive.org

Security analysis of a proposed internet of things middleware

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0729-3

Abstract: This paper proposes security measures for a defined uniform and transparent internet of things middleware, named UIoT. The proposed architecture is deployable and comprises protection measures based on existent technologies for internet security, as well… read more here.

Keywords: security analysis; things middleware; security; internet things ... See more keywords
Photo from archive.org

Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6598-9

Abstract: In recent years, reversible data hiding in encrypted images (RDH-EI) has attracted more and more attention, and many RDH-EI algorithms have been proposed. Scholars focus on improving embedded capacity and decreasing bit error rate, but… read more here.

Keywords: algorithm; encrypted images; security analysis; reversible watermarking ... See more keywords

Asymptotic security analysis of teleportation-based quantum cryptography

Sign Up to like & get
recommendations!
Published in 2020 at "Quantum Information Processing"

DOI: 10.1007/s11128-020-02701-w

Abstract: We prove that the teleportation-based quantum cryptography protocol presented in Gordon and Rigolin (Opt Commun 283:184, 2010), which is built using only orthogonal states encoding the classical bits that are teleported from Alice to Bob,… read more here.

Keywords: based quantum; security analysis; security; quantum cryptography ... See more keywords

An integrated safety and security analysis for cyber-physical harm scenarios

Sign Up to like & get
recommendations!
Published in 2021 at "Safety Science"

DOI: 10.1016/j.ssci.2021.105458

Abstract: Abstract Increasing digitalization and autonomous solutions in physical systems promise to enhance their performance, cost-efficiency and reliability. However, the integration of novel information technologies with safety-related systems also brings new vulnerabilities and risks that challenge… read more here.

Keywords: security analysis; harm scenarios; analysis; safety ... See more keywords
Photo by sarahdorweiler from unsplash

Security analysis of cyber-physical systems using H 2 norm

Sign Up to like & get
recommendations!
Published in 2017 at "Iet Control Theory and Applications"

DOI: 10.1049/iet-cta.2016.1391

Abstract: In this study, the effect of attacks on networked systems is studied and a new security index to analyse the impact of such attacks using H 2 norms of attacks to target and monitoring outputs… read more here.

Keywords: security analysis; analysis; cyber physical; security ... See more keywords

Trojan-horse attack on a real-world quantum key distribution system: Theoretical and experimental security analysis

Sign Up to like & get
recommendations!
Published in 2024 at "Physical Review Applied"

DOI: 10.1103/physrevapplied.22.034032

Abstract: This paper presents a theoretical and experimental demonstration of a security analysis of a Trojan-horse attack (THA) on a real-world quantum key distribution (QKD) system. We show that the upper bound on the information leakage… read more here.

Keywords: system; attack; analysis; security analysis ... See more keywords

Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2926401

Abstract: Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et… read more here.

Keywords: pollution attacks; security analysis; homomorphic mac; security ... See more keywords
Photo from wikipedia

Graph-based Cyber Security Analysis of State Estimation in Smart Power Grid

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2017.1600210c

Abstract: The smart power grid enables intelligent automation at all levels of power system operation, from electricity generation at power plants to power usage in the home. The key enabling factor of an efficient smart grid… read more here.

Keywords: grid; state estimation; security analysis; power ... See more keywords

Security Analysis of Cryptocurrency Wallets in Android-Based Applications

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Network"

DOI: 10.1109/mnet.011.2000025

Abstract: As digital currency wallets are gaining popularity, security incidents related to them are also increasing. They lead to the disclosure of users' private information and security threats of users' assets. This article analyzes the security… read more here.

Keywords: wallets android; analysis cryptocurrency; security analysis; security ... See more keywords

Security Analysis of Linearization for Nonlinear Networked Control Systems Under DoS

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Control of Network Systems"

DOI: 10.1109/tcns.2021.3078130

Abstract: We explore a security analysis of nonlinear networked control systems under denial-of-service (DoS) attacks. In particular, we focus on the vulnerability of a linearization approach in a stabilization problem. When linearization-based control is used, DoS… read more here.

Keywords: linearization; control; security analysis; networked control ... See more keywords