J Zhao, H Hu, F Huang, Y Guo, L Liao - Electronics, 2023 - mdpi.com
This paper mainly summarizes three aspects of information security: Internet of Things (IoT) authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …
JJD Rivera, A Muhammad… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
As network systems advance and become more sophisticated, the associated security challenges grow more complex. The zero trust model emerges as a new paradigm to …
M Venkatesan, P Mani - Optical and Quantum Electronics, 2024 - Springer
Access control systems have become integral to every organization's defensive arsenal to protect sensitive information and ensure that businesses comply with data privacy …
V Awale, S Gaikwad - 2023 14th International Conference on …, 2023 - ieeexplore.ieee.org
Traditional security measures focused on network perimeter protection are no longer sufficient to defend against cyber threats in the quickly changing digital environment of …
In today's interconnected world, the line that separates the network perimeter can no longer be identified. This has led to the development of Zero Trust Networking (ZTN) and Software …
The security architecture of Information Technology (IT) systems has traditionally been based on the perimeter security model, in which resources are grouped into perimeters …
The increasing frequency and severity of cyberattacks demand robust security solutions, especially for missioncritical environments. A key challenge is the dynamic configuration of …