Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions

AJ Perez, S Zeadally - Computer Science Review, 2022 - Elsevier
The advent of Blockchain and smart contracts is empowering many technologies and
systems to automate commerce and facilitate the exchange, tracking and the provision of …

[图书][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

Blockchain-based solutions for mobile crowdsensing: A comprehensive survey

R Yu, AM Oguti, MS Obaidat, S Li, P Wang… - Computer Science …, 2023 - Elsevier
Mobile crowdsensing (MCS) is an emerging data-driven paradigm that leverages the
collective intelligence of the crowd, their mobility, and the crowd-companioned smart mobile …

Engineering security into distributed systems: A survey of methodologies

A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …

Specification-based test generation for security-critical systems using mutations

G Wimmel, J Jürjens - Formal Methods and Software Engineering: 4th …, 2002 - Springer
In specification-based testing, test sequences are generated from an abstract system
specification to provide confidence in the correctness of an implementation. For security …

A Comparative Study of Protocols' Security Verification Tools: Avispa, Scyther, ProVerif, and Tamarin

Y Belfaik, Y Lotfi, Y Sadqi, S Safi - International Conference on Digital …, 2024 - Springer
The proliferation of Internet and network-based services has experienced significant growth,
leading to the creation of novel security protocols across many different systems. This …

[PDF][PDF] Security and privacy in ubiquitous sensor networks

AJ Perez, S Zeadally, N Jabeur - Journal of Information Processing …, 2018 - koreascience.kr
The availability of powerful and sensor-enabled mobile and Internet-connected devices
have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides …

Slede: a domain-specific verification framework for sensor network security protocol implementations

Y Hanna, H Rajan, W Zhang - Proceedings of the first ACM conference …, 2008 - dl.acm.org
Finding flaws in security protocol implementations is hard. Finding flaws in the
implementations of sensor network security protocols is even harder because they are …

Investigating security for ubiquitous sensor networks

AJ Perez, S Zeadally, N Jabeur - Procedia computer science, 2017 - Elsevier
The availability of powerful and sensor-enabled mobile and Internet-connected devices
have enabled the advent of the ubiquitous sensor network paradigm which is providing …

Formal verification of cryptographic protocols with automated reasoning

B Smyth - 2011 - etheses.bham.ac.uk
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security
of numerous critical components has been neglected. As a consequence, attacks have …