Securing BGP—A literature survey

G Huston, M Rossi, G Armitage - … Communications Surveys & …, 2010 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of
the major concerns related to BGP is its lack of effective security measures, and as a result …

Mutual authentication in IoT systems using physical unclonable functions

MN Aman, KC Chua, B Sikdar - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a great opportunity to connect people, information,
and things, which will in turn cause a paradigm shift in the way we work, interact, and think …

[图书][B] Practical cryptography

N Ferguson, B Schneier - 2003 - rizkia.staff.telkomuniversity.ac.id
Trademarks: Wiley, the Wiley Publishing logo and related trade dress are trademarks or
registered trademarks of Wiley Publishing, Inc., in the United States and other countries, and …

Data integrity: a security threat for internet of things and cyber-physical systems

VG Garagad, NC Iyer, HG Wali - 2020 International Conference …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT), is emerging as the most evolving technology and contributing to the
critical domain areas from transportation, to manufacturing, to energy, to automation, to …

Two-factor authentication for IoT with location information

MN Aman, MH Basheer, B Sikdar - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The number of Internet of Things (IoT) devices is expected to grow exponentially in the near
future and produce large amounts of potentially sensitive data. The simple and low cost …

[PDF][PDF] 4store: The design and implementation of a clustered RDF store

S Harris, N Lamb, N Shadbolt - 5th International Workshop on …, 2009 - academia.edu
This paper describes the design and implementation of the 4store RDF storage and
SPARQL query system with respect to its cluster and query processing design. 4store was …

Passport: Secure and Adoptable Source Authentication.

X Liu, A Li, X Yang, D Wetherall - Nsdi, 2008 - usenix.org
We present the design and evaluation of Passport, a system that allows source addresses to
be validated within the network. Passport uses efficient, symmetric-key cryptography to place …

Теоретические основы идентификации источников информации, передаваемой блоками ограниченного размера

МО Таныгин - 2020 - elibrary.ru
Монография посвящена построению формальной теории идентификации источников
блоков данных, базирующихся на методах анализа неполной идентификационной …

Token-based security for the Internet of Things with dynamic energy-quality tradeoff

MN Aman, S Taneja, B Sikdar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
In this paper, token-based security protocols with dynamic energy-security level tradeoff for
Internet of Things (IoT) devices are explored. To assure scalability in the mechanism to …

Low power data integrity in IoT systems

MN Aman, B Sikdar, KC Chua… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Devices in the Internet of Things (IoT) produce large amounts of sensitive data. However, the
use of the public Internet for data transfer by IoT devices makes them susceptible to cyber …