A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods

Z Pethő, Á Török, Z Szalay - Transactions on Emerging …, 2021 - Wiley Online Library
Nowadays, cybersecurity is an emerging research area in the automotive industry, and it is
investigated by many different perspectives. Our article is a review of existing vehicular …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

Efficient and provably secure key agreement for modern smart metering communications

A Braeken, P Kumar, A Martin - Energies, 2018 - mdpi.com
Security in modern smart metering communications and in smart grid networks has been an
area of interest recently. In this field, identity-based mutual authentication including …

Multi-tag and multi-owner RFID ownership transfer in supply chains

G Kapoor, W Zhou, S Piramuthu - Decision Support Systems, 2011 - Elsevier
In any supply chain, there is a high likelihood for individual objects to change ownership at
least once in their lifetime. As RFID tags enter the supply chain, these RFID-tagged objects …

Privacy-Preserving Lightweight Authentication for Location-Aware Edge-Enabled eHealth Systems

PM Rao, A Vangala, S Pedada, AK Das… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
With the rapid advancements in the Internet of Things (IoT), edge computing has a
significant role in many eHealth applications. However, security and data privacy are major …

eCK 模型的安全性分析

倪亮, 陈恭亮, 李建华 - 山东大学学报(理学版), 2013 - lxbwk.njournal.sdu.edu.cn
认证密钥协商协议应该尽可能多地具备良好的安全性质以满足实际的需求. 作为最近提出的一种
设计和分析两方认证密钥协商协议的形式化方法, eCK 模型正受到越来越多的关注 …

Security and Privacy Issues in 5G/6G‐Assisted Software‐Defined Networks

D Chattaraj, AK Das - Software Defined Networks: Architecture …, 2022 - Wiley Online Library
Emerging 5G/6G communication and next‐generation Internet (NGI) technologies demand
proper administration and control of an ultra large‐scale dynamic network to provide high …

A Novel Secure SDN Architecture for Reliable Data Transmission in 5G Networks

J Sathiamoorthy, M Usha… - Software Defined …, 2022 - Wiley Online Library
Software‐defined networking (SDN) helps streamline the management of computer
networks using software code and well‐structured interfaces. This helps in enhanced QoS …

[PDF][PDF] Secure Electronic Healthcare Record based on Distributed Global Database and Schnorr Signcryption

M Fareed, AA Yassin - Iraqi Journal for Electrical And Electronic Engineering, 2023 - iasj.net
Preserving privacy and security plays a key role in allowing each component in the
healthcare system to access control and gain privileges for services and resources. Over …

Security analysis of the authentication modules of Chinese WLAN standard and its implementation plan

X Li, J Ma, SJ Moon - IFIP International Conference on Network and …, 2007 - Springer
Abstract With the Canetti-Krawczyk (CK) model, we analyze the authentication module WAIs
in the Chinese WLAN national security standard WAPI and its implementation plan …