Articles with "security mechanism" as a keyword



Photo by scottwebb from unsplash

ARMOR: An anti-counteRfeit security Mechanism for lOw cost Radio frequency identification systems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2020.2964435

Abstract: Counterfeited products are costing the global economy hundreds of billions of dollars annually. Radio frequency identification(RFID) technology provides a promising solution for this problem, wherein each product is fitted with a secure tag, which is… read more here.

Keywords: radio frequency; security; tag; security mechanism ... See more keywords
Photo by scottwebb from unsplash

A Security Mechanism for IEEE C37.118.2 PMU Communication

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Electronics"

DOI: 10.1109/tie.2021.3053897

Abstract: Phasor measurement units (PMUs) are widely used to monitor the operating conditions of a smart grid. The PMU communication network is, generally, a public wide area network, hence it is vulnerable to cyberattacks. At present,… read more here.

Keywords: security mechanism; ieee c37; communication; security ... See more keywords
Photo from wikipedia

Morton Filter-Based Security Mechanism for Healthcare System in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2021 at "Healthcare"

DOI: 10.3390/healthcare9111551

Abstract: Electronic health records contain the patient’s sensitive information. If these data are acquired by a malicious user, it will not only cause the pilferage of the patient’s personal data but also affect the diagnosis and… read more here.

Keywords: security mechanism; morton filter; security;