Zobrazeno 1 - 10
of 390
pro vyhledávání: '"Proverif"'
Publikováno v:
IEEE Access, Vol 12, Pp 173670-173685 (2024)
Transport Layer Security (TLS) is a widely used protocol for secure channel establishment. However, TLS lacks any inherent mechanism for validating the security state of the endpoint software and its platform. To overcome this limitation, recent work
Externí odkaz:
https://doaj.org/article/3e1b0a5e75d840068630b67fbbfc83fb
Autor:
Ghazaleh Sarbishaei, Amir Masoud Aminian Modarres, Farahnaz Jowshan, Fateme Zahra Khakzad, Hasti Mokhtari
Publikováno v:
IEEE Access, Vol 12, Pp 106253-106272 (2024)
The benefits of smart homes have made them a necessary part of modern human life. It is, however, essential to ensure the security of smart homes in order to protect personal information, prevent unauthorized access, provide physical security, and de
Externí odkaz:
https://doaj.org/article/b114e46b2db0408791c8465d4a5ad5e2
Publikováno v:
IEEE Access, Vol 12, Pp 31605-31625 (2024)
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic
Externí odkaz:
https://doaj.org/article/865612bd6f494081aa6978391493858a
Publikováno v:
Applied Sciences, Vol 14, Iss 23, p 11152 (2024)
The 5th Generation Mobile Communication (5G) plays a significant role in the Fourth Industrial Revolution (4IR), facilitating significant improvements and innovations in various fields. The 3rd Generation Partnership Project (3GPP) is currently stand
Externí odkaz:
https://doaj.org/article/576899fc3ced457a9bd44b64f75be7dc
Autor:
Naveed Khan, Zhang Jianbiao, Huhnkuk Lim, Jehad Ali, Intikhab Ullah, Muhammad Salman Pathan, Shehzad Ashraf Chaudhry
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-16 (2023)
Abstract Through the broad usage of cloud computing and the extensive utilization of next-generation public clouds, people can share valuable information worldwide via a wireless medium. Public cloud computing is used in various domains where thousan
Externí odkaz:
https://doaj.org/article/707b6d9a7cc743e1befb520c6dbaed44
Autor:
Sajid Hussain, Muhammad Farooq, Bander A. Alzahrani, Aiiad Albeshri, Khalid Alsubhi, Shehzad Ashraf Chaudhry
Publikováno v:
IEEE Access, Vol 11, Pp 59688-59700 (2023)
The Internet of Drones (IoD) has blown up the interest of academia and industry due to their deployment in military and civil fields. In the IoD environment, drones collect and transmit real-time data to the users through an insecure wireless medium.
Externí odkaz:
https://doaj.org/article/ed791340580d4c7da1f8991542b73dfd
Publikováno v:
Mathematics, Vol 12, Iss 5, p 716 (2024)
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they
Externí odkaz:
https://doaj.org/article/67dd5bced3f040aa917363fb7a0d34d4
Publikováno v:
Symmetry, Vol 15, Iss 10, p 1886 (2023)
Unmanned aerial vehicles (UAVs) have become increasingly popular in recent years and are applied in various fields, from commercial and scientific to military and humanitarian operations. However, their usage presents many challenges, including limit
Externí odkaz:
https://doaj.org/article/433fbcecb6fd4ac9887455d3b920c76c
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.