The identification of network attacks which target information and communication systems has been a focus of the research community for years. Network intrusion detection is a …
Quantum networks build on entanglement and quantum measurement to achieve tasks that are beyond the reach of classical systems. Using quantum effects, we can detect the …
K Bhargavan, G Leurent - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
While modern block ciphers, such as AES, have a block size of at least 128 bits, there are many 64-bit block ciphers, such as 3DES and Blowfish, that are still widely supported in …
Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses …
AK Yerrapragada, T Eisman… - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
If Beyond-5G (B5G)/6G is to support critical infrastructure worldwide, there must be an effort to jointly integrate low latency and privacy into wireless protocols. This research analyzes …
In this paper we discuss security procedures for constrained IoT devices. We start with the description of a general security architecture along with its basic procedures, then discuss …
Dramatic increase in road traffic volume has made driving safety and traffic efficiency more challenging, but smart transportation has been spotlighted as a promising technology for …
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027 …