On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A comprehensive survey of v2x cybersecurity mechanisms and future research paths

R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …

The TAMARIN prover for the symbolic analysis of security protocols

S Meier, B Schmidt, C Cremers, D Basin - Computer Aided Verification …, 2013 - Springer
The Tamarin prover supports the automated, unbounded, symbolic analysis of security
protocols. It features expressive languages for specifying protocols, adversary models, and …

Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

Q Jiang, S Zeadally, J Ma, D He - Ieee Access, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the
components of the Internet of Things, and will become globally addressable by any entity …

A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems

X Li, J Peng, MS Obaidat, F Wu, MK Khan… - IEEE Systems …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) enables all objects to connect to the Internet and exchange data
via different emerging technologies, which makes the intelligent identification and …

Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

B Bera, AK Das, AK Sutrala - Computer Communications, 2021 - Elsevier
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in
delivering the packages, and real-time object detection and tracking with minimal human …

The AVISPA tool for the automated validation of internet security protocols and applications

A Armando, D Basin, Y Boichut, Y Chevalier… - … Aided Verification: 17th …, 2005 - Springer
AVISPA is a push-button tool for the automated validation of Internet security-sensitive
protocols and applications. It provides a modular and expressive formal language for …

The scyther tool: Verification, falsification, and analysis of security protocols: Tool paper

CJF Cremers - International conference on computer aided verification, 2008 - Springer
With the rise of the Internet and other open networks, a large number of security protocols
have been developed and deployed in order to provide secure communication. The analysis …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …