[HTML][HTML] Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Security, privacy, and safety aspects of civilian drones: A survey

R Altawy, AM Youssef - ACM Transactions on Cyber-Physical Systems, 2016 - dl.acm.org
The market for civilian unmanned aerial vehicles, also known as drones, is expanding
rapidly as new applications are emerging to incorporate the use of civilian drones in our …

[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

Secure intelligent traffic light control using fog computing

J Liu, J Li, L Zhang, F Dai, Y Zhang, X Meng… - Future Generation …, 2018 - Elsevier
As the number of vehicles grows, traffic efficiency is becoming a worldwide problem.
Intelligent transportation system aims to improve the traffic efficiency, where intelligent traffic …

Detecting and correcting malicious data in VANETs

P Golle, D Greene, J Staddon - Proceedings of the 1st ACM international …, 2004 - dl.acm.org
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks
(VANETs) must rely heavily on node-to-node communication, thus allowing for malicious …

Secure verification of location claims

N Sastry, U Shankar, D Wagner - Proceedings of the 2nd ACM workshop …, 2003 - dl.acm.org
With the growing prevalence of sensor and wireless networks comes a new demand for
location-based access control mechanisms. We introduce the concept of secure location …

Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures

P Asuquo, H Cruickshank, J Morley… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Location-based services (LBSs) have gained popularity as a result of the advances in
mobile and communication technologies. LBS provide users with relevant information based …

Method and apparatus for securing documents using a position dependent file system

WJ Gauvin - US Patent 8,312,064, 2012 - Google Patents
US8312064B1 - Method and apparatus for securing documents using a position dependent
file system - Google Patents US8312064B1 - Method and apparatus for securing documents …

The next paradigm shift: from vehicular networks to vehicular clouds

S Olariu, T Hristov, G Yan - Mobile ad hoc networking: cutting …, 2013 - Wiley Online Library
The goal of this chapter is to introduce and review the challenges and opportunities offered
by what promises to be the Next Paradigm Shift: From Vehicular Networks to Vehicular …

Robust location distinction using temporal link signatures

N Patwari, SK Kasera - Proceedings of the 13th annual ACM …, 2007 - dl.acm.org
The ability of a receiver to determine when a transmitter has changed location is important
for energy conservation in wireless sensor networks, for physical security of radio-tagged …