Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-0729-3
Abstract: This paper proposes security measures for a defined uniform and transparent internet of things middleware, named UIoT. The proposed architecture is deployable and comprises protection measures based on existent technologies for internet security, as well…
read more here.
Keywords:
security analysis;
things middleware;
security;
internet things ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6598-9
Abstract: In recent years, reversible data hiding in encrypted images (RDH-EI) has attracted more and more attention, and many RDH-EI algorithms have been proposed. Scholars focus on improving embedded capacity and decreasing bit error rate, but…
read more here.
Keywords:
algorithm;
encrypted images;
security analysis;
reversible watermarking ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Quantum Information Processing"
DOI: 10.1007/s11128-020-02701-w
Abstract: We prove that the teleportation-based quantum cryptography protocol presented in Gordon and Rigolin (Opt Commun 283:184, 2010), which is built using only orthogonal states encoding the classical bits that are teleported from Alice to Bob,…
read more here.
Keywords:
based quantum;
security analysis;
security;
quantum cryptography ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Safety Science"
DOI: 10.1016/j.ssci.2021.105458
Abstract: Abstract Increasing digitalization and autonomous solutions in physical systems promise to enhance their performance, cost-efficiency and reliability. However, the integration of novel information technologies with safety-related systems also brings new vulnerabilities and risks that challenge…
read more here.
Keywords:
security analysis;
harm scenarios;
analysis;
safety ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Iet Control Theory and Applications"
DOI: 10.1049/iet-cta.2016.1391
Abstract: In this study, the effect of attacks on networked systems is studied and a new security index to analyse the impact of such attacks using H 2 norms of attacks to target and monitoring outputs…
read more here.
Keywords:
security analysis;
analysis;
cyber physical;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2926401
Abstract: Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et…
read more here.
Keywords:
pollution attacks;
security analysis;
homomorphic mac;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.2017.1600210c
Abstract: The smart power grid enables intelligent automation at all levels of power system operation, from electricity generation at power plants to power usage in the home. The key enabling factor of an efficient smart grid…
read more here.
Keywords:
grid;
state estimation;
security analysis;
power ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Network"
DOI: 10.1109/mnet.011.2000025
Abstract: As digital currency wallets are gaining popularity, security incidents related to them are also increasing. They lead to the disclosure of users' private information and security threats of users' assets. This article analyzes the security…
read more here.
Keywords:
wallets android;
analysis cryptocurrency;
security analysis;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Control of Network Systems"
DOI: 10.1109/tcns.2021.3078130
Abstract: We explore a security analysis of nonlinear networked control systems under denial-of-service (DoS) attacks. In particular, we focus on the vulnerability of a linearization approach in a stabilization problem. When linearization-based control is used, DoS…
read more here.
Keywords:
linearization;
control;
security analysis;
networked control ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2018.2812080
Abstract: Over the past years, an enormous variety of different chaos-based image and video encryption algorithms have been proposed and published. While any algorithm published undergoes some more or less strict experimental security analysis, many of…
read more here.
Keywords:
based image;
security analysis;
security;
encryption ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2023.3265815
Abstract: Scan is the de-facto standard for testing, which provides high observability and test coverage by enabling direct access to chip memory elements. The scan-based Design-for-Testability (DfT) technique has also become the prime target of attackers…
read more here.
Keywords:
obfuscation;
scan obfuscation;
security analysis;
obfuscation techniques ... See more keywords