F Maqsood, M Ahmed, MM Ali… - International Journal of …, 2017 - pdfs.semanticscholar.org
Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best …
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight …
S Aslam, A Tošić, M Mrissa - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However …
Abstract Blockchain and Internet of Things (IoT), two of the top disruptive technologies, are already on their way of reshaping our future of the digital world, characterized by a drastic …
DK Nilsson, UE Larson, E Jonsson - … upon Tyne, UK, September 22-25 …, 2008 - Springer
A set of guidelines for creating a secure infrastructure for wireless diagnostics and software updates in vehicles is presented. The guidelines are derived from a risk assessment for a …
FC Kuo, H Tschofenig, F Meyer… - … IEEE INFOCOM 2006 …, 2006 - ieeexplore.ieee.org
The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing key …
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single …
AV Bulgakov, OF Bobrenok, I Ozerov, W Marine… - Applied Physics A, 2004 - Springer
Neutral and charged phosphorus clusters of a wide size range have been produced by pulsed laser ablation (PLA) in vacuum at 532, 337, and 193 nm ablating wavelengths and …