Security challenges in the industry 4.0 era

MM Alani, M Alloghani - Industry 4.0 and engineering for a sustainable …, 2019 - Springer
Although the concept of Industry 4.0 was introduced in 2011 at the Hannover Fair, it was
only recently that it gained major attention. The fourth industrial revolution, referred to as …

[图书][B] Smart Card Security: Applications, Attacks, and Countermeasures

BB Gupta, M Quamara - 2019 - taylorfrancis.com
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of
smart card technology and explores different security attacks and countermeasures …

Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card

R Casanova-Marqués, P Dzurenda… - Proceedings of the 17th …, 2022 - dl.acm.org
Java Card stands out as a good choice for the development of smart card applications due
to the high interoperability between different manufacturers, its security, and wide support of …

Provably unlinkable smart card-based payments

S Bursuc, R Horne, S Mauw, S Yurkov - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The most prevalent smart card-based payment method, EMV, currently offers no privacy to
its users. Transaction details and the card number are sent in cleartext, enabling the profiling …

Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity

S Yurkov - 2023 - orbilu.uni.lu
[en] Cryptographic protocols are instructions explaining how the communication be-tween
agents should be done. Critical infrastructure sectors, such as communication networks …

Design and Implementation of a Blockchain-based Global Authentication System Using Biometrics and Subscriber Identification Module

N Khalili - 2022 - ruor.uottawa.ca
The digital world tolerates a high volume of information and interactions. Considering the
usage of electronic services by authorities, User Authentication (UA) is crucial. Numerous …

Enhancing the Security of ISO/IEC 14443-3 and 4 RFID Authentication Protocols through Formal Analysis

L Pankaczi, M Eldefrawy - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
Due to cyber attacks targeting RFID systems, this paper briefly summarizes parts 3 and 4 of
the ISO/IEC 14443 standard, which specify the initialization, selection, and trans-mission …

Towards to Lightweight and Secure Access Control Systems for Car-Sharing Services

P Dzurenda, L Malina, P Loutocky… - … Congress on Ultra …, 2022 - ieeexplore.ieee.org
Car-sharing is currently a very popular and rapidly expanding service. On the one hand, it
helps users to use their vehicles efficiently and reduce the cost of car ownership. On the …

Evaluating intrusion detection points in an end-to-end solution

L Pankaczi - 2023 - diva-portal.org
Evaluating all intrusion detection points in an end-to-end cyberphysical system can be
challenging. This master thesis focuses on evaluating the security of the most exposed part …

Privacy-enhancing technologies and privacy-enhancing cryptography for wearables

In response to escalating privacy concerns and the need for secure digital communication,
cryptographic mechanisms have been developed to ensure impervious information …