Cyber security refers to the protection of Internet-connected systems, such as hardware, software as well as data (information) from cyber attacks (adversaries). A cyber security …
D He, S Zeadally, N Kumar… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Rapid advances in wireless communication technologies have paved the way for a wide range of mobile devices to become increasingly ubiquitous and popular. Mobile devices …
With the exponential increase of the mobile devices and the fast development of cloud computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …
S Kumari, X Li, F Wu, AK Das, KKR Choo… - Future Generation …, 2017 - Elsevier
Abstract Big Data and Cloud of Things (CoT) are two inter-related research trends in our data-driven society, and one research challenge is to design efficient security solution that …
The concept of the Internet of Vehicles (IoV) has attracted the attention of many sectors such as the automotive industry, academia, engineering, etc., offering a wide variety of benefits …
Smart grid (SG) is a highly efficient and more reliable framework that controls the computer, automation, new technologies and equipment. In SG, electricity utilization and …
D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding how to achieve better security. Dozens of multi-factor authentication schemes for multi …
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight …
H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee - Journal of Information …, 2020 - Elsevier
To accelerate the deployment of fifth-generation (5G) cellular networks, millions of devices are being connected to massive Internet of Things (IoT) networks. However, advances in the …