Articles with "security verification" as a keyword



Photo from wikipedia

Security Verification for Cyber-Physical Systems Using Model Checking

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3081587

Abstract: A malicious attack may endanger human life or pollute environment on a cyber-physical system (CPS). However, successfully attacking a CPS needs not only the knowledge of information technology (IT) but also the domain knowledge of… read more here.

Keywords: security constraints; model; using model; security ... See more keywords
Photo by priscilladupreez from unsplash

Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14081567

Abstract: The proper verification of users plays a vital role during communication over a social network to protect the personal data of users. Multifarious protocols have been implemented to secure the confidential data of the users,… read more here.

Keywords: social network; exchange; protocol; security verification ... See more keywords