Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Pegah Nikbakht Bideh"'
Autor:
Pegah Nikbakht Bideh
Publikováno v:
Lecture Notes in Computer Science; 13620 (2022)
Information Security Practice and Experience ISBN: 9783031212796
Information Security Practice and Experience ISBN: 9783031212796
Due to limitations of IoT networks including limited bandwidth, memory, battery, etc., secure multicast group communication has gained more attention, and to enable that a group key establishment scheme is required to share the secret key among the g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9e13f839304b3ce898b5627c3d84c4e0
https://lup.lub.lu.se/record/b77adfa4-8b3b-4c81-8e1e-8572e9e3cf82
https://lup.lub.lu.se/record/b77adfa4-8b3b-4c81-8e1e-8572e9e3cf82
Internet of Things (IoT) firmware upgrade has turned out to be a challenging task with respect to security. While Over-The-Air (OTA) software upgrade possibility is an essential feature to achieve security, it is also most sensitive to attacks and lo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::767b7b80ac2ce7a080476cf4d3012068
https://lup.lub.lu.se/record/a29d7402-e6b3-4978-8beb-8aefd0374d24
https://lup.lub.lu.se/record/a29d7402-e6b3-4978-8beb-8aefd0374d24
Autor:
Pegah Nikbakht Bideh, Nicolae Paladi
Publikováno v:
Information and Communications Security ISBN: 9783031157769
The growing diversity of connected devices leads to complex network deployments, often made up of endpoints that implement in- compatible network application protocols. Communication between heterogeneous network protocols was traditionally enabled b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3a3c2f3a2c3bc6d1fcc011f66a995345
https://lup.lub.lu.se/record/065726f2-959a-47dd-b812-d008417ec522
https://lup.lub.lu.se/record/065726f2-959a-47dd-b812-d008417ec522
Publikováno v:
ICIN
2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)
24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track
2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)
24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track
Emerging fine-grained cloud resource billing creates incentives to review the software execution footprint in virtual environments. Operators can use novel virtual execution environments with ever lower overhead: from virtual machines to containers,
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030900212
SecureComm (2)
Lund University
SecureComm (2)
Lund University
Increasingly fine-grained cloud billing creates incentives to review the software execution footprint in virtual environments. For example, virtual execution environments move towards lower overhead: from virtual machines to containers, unikernels, a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e254a7621799c878dc005a8bf3295574
https://doi.org/10.1007/978-3-030-90022-9_11
https://doi.org/10.1007/978-3-030-90022-9_11
Publikováno v:
17th EAI International Conference on Security and Privacy in Communication Networks (EAI SecureComm 2021)
Publikováno v:
IOT
In this paper we address the energy consumption of the Constraint Application Protocol (CoAP) and the Message Queue Telemetry Transport (MQTT) protocol and compare their overhead. We also pay attention to the use case of security in IoT and analyze t
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811537493
Advances in Intelligent Systems and Computing, AISC; 1144, pp 59-70 (2020)
Advances in Intelligent Systems and Computing, AISC; 1144, pp 59-70 (2020)
Vehicle traffic management is becoming more complex due to increased traffic density in cities. Novel solutions are necessary for emergency vehicles, which despite growing congestion must be able to quickly reach their destination. Emergency vehicles
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e9fc202572d68432c8bedf1d81baf4f2
https://doi.org/10.1007/978-981-15-3750-9_5
https://doi.org/10.1007/978-981-15-3750-9_5
Publikováno v:
Lecture Notes in Computer Science; 12026, pp 355-364 (2020)
Lecture Notes in Computer Science ISBN: 9783030415679
CRiSIS
Lecture Notes in Computer Science ISBN: 9783030415679
CRiSIS
With the inclusion of external software components in their software, vendors also need to identify and evaluate vulnerabilities in the components they use. A growing number of external components makes this process more time-consuming, as vendors ne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::72651a80520d070db9bff90ed614cf05
https://lup.lub.lu.se/record/83dd4b29-3471-4c90-9bb2-ba14990ec364
https://lup.lub.lu.se/record/83dd4b29-3471-4c90-9bb2-ba14990ec364
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030415679
With the inclusion of external software components in their software, vendors also need to identify and evaluate vulnerabilities in the components they use. A growing number of external components makes this process more time-consuming, as vendors ne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8ced8e7123948d6296d4d94c61746f06
https://doi.org/10.1007/978-3-030-41568-6
https://doi.org/10.1007/978-3-030-41568-6