Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Aldar C-F. Chan"'
Autor:
Aldar C-F. Chan, Jianying Zhou
Publikováno v:
IEEE Communications Magazine. :1-7
Autor:
Aldar C.-F. Chan, Jianying Zhou
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031168147
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2cf5dd6bea2db16071266eb421d812f7
https://doi.org/10.1007/978-3-031-16815-4_19
https://doi.org/10.1007/978-3-031-16815-4_19
Autor:
Jianying Zhou, Aldar C.-F. Chan
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 16:3367-3376
Availability of the charging infrastructure is critical for a smooth rollout of wide-scale electric vehicle (EV) adoption. Safe integration of the charging infrastructure with the power grid heavily relies on an intelligent platform to support demand
Autor:
Jianying Zhou, Aldar C.-F. Chan
Publikováno v:
IEEE Journal on Selected Areas in Communications. 32:1509-1517
Entity authentication and related key management is an active research topic in smart grid security. However, existing works seem to have overlooked the significance that the smart grid is a cyber-physical system, which entails more considerations in
Autor:
Aldar C.-F. Chan
Publikováno v:
Theoretical Computer Science. :21-36
Any secured system can be modeled as a capability-based access control system in which each user is given a set of secret keys of the resources he is granted access to. In some large systems with resource-constrained devices, such as sensor networks
Autor:
Aldar C.-F. Chan, Jianying Zhou
Publikováno v:
IEEE Communications Magazine. 51:58-65
Cybersecurity is an important but usually not adequately addressed area in the smart grid. Its standardization is also relatively immature. The NISTIR 7628 seems to be a comprehensive document for security designers/practitioners in smart grid resear
Publikováno v:
Computer Security – ESORICS 2016 ISBN: 9783319457437
ESORICS (1)
ESORICS (1)
Two-factor authentication is increasingly demanded in the Internet of Things (IoT), especially those deployed in the critical infrastructure. However, resource and operational constraints of typical IoT devices are the key impediment, especially when
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9af9d0dbcee9b9f22fc58aec6b869da5
https://doi.org/10.1007/978-3-319-45744-4_5
https://doi.org/10.1007/978-3-319-45744-4_5
Autor:
Aldar C.-F. Chan, Claude Castelluccia
Publikováno v:
ACM Transactions on Sensor Networks. 7:1-45
A formal treatment to the security of Concealed Data Aggregation (CDA) and the more general Private Data Aggregation (PDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA or PDA are still lacking.
Publikováno v:
ACM Transactions on Sensor Networks. 5:1-36
Wireless sensor networks (WSNs) are composed of tiny devices with limited computation and battery capacities. For such resource-constrained devices, data transmission is a very energy-consuming operation. To maximize WSN lifetime, it is essential to
Autor:
Aldar C.-F. Chan
Publikováno v:
IEEE Wireless Communications Letters. 1:46-48
Identity Based Cryptography (IBC) has the advantage that no public key certification is needed when used in a mobile ad hoc network (MANET). This is especially useful when bi-directional channels do not exist in a MANET. However, IBC normally needs a