Zobrazeno 1 - 10
of 1 544
pro vyhledávání: '"Security Protocols"'
Autor:
Muhana Magboul Ali Muslam
Publikováno v:
Vehicles, Vol 6, Iss 1, Pp 450-467 (2024)
Vehicle-to-vehicle (V2V) communication has played a pivotal role in modern intelligent transportation systems, enabling seamless information exchange among vehicles to enhance road safety, traffic efficiency, and overall driving experience. However,
Externí odkaz:
https://doaj.org/article/84066ffe5eee4fe8b7e8c06c4b73d7c2
Publikováno v:
Applied Sciences, Vol 14, Iss 23, p 10968 (2024)
Data in-transit from an at-rest state can be securely transmitted and managed within a network. Background: This work covers the design and simulation of an Enhanced Network Topology (ENT) with multiple components that connects multiple locations of
Externí odkaz:
https://doaj.org/article/5deec0eef61847ba8406dcadbf9b541e
Autor:
Agnieszka M. Zbrzezny, Olga Siedlecka-Lamch, Sabina Szymoniak, Andrzej Zbrzezny, Mirosław Kurkowski
Publikováno v:
Applied Sciences, Vol 14, Iss 22, p 10333 (2024)
This article introduces a new method for modelling and verifying the execution of timed security protocols (TSPs) and their time-dependent security properties. The method, which is novel and reliable, uses an extension of interpreted systems, accessi
Externí odkaz:
https://doaj.org/article/d26158a578204b63a90c016325d3a07e
Autor:
Bartosz Kościug, Piotr Bilski
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 69, Iss No 2, Pp 253-259 (2023)
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and
Externí odkaz:
https://doaj.org/article/cde7fa8415d84a978cff28040be0c703
Autor:
Sharmeen Izzat Hassan, Mohammed Jasim Mohammed, Alaan Ghazi, Abdullah Mohammed Awad, Haider Mahmood Jawad, Karam Mudhafar Jasim, Ainura Nurmamatovna Mitalipova
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 35, Iss 1, p 464 (2024)
Background: The shift from 4G LTE to 5G networks represents a substantial advancement in wireless communication technology, providing improved data transfer rates, decreased response time, and heightened connectedness. Nevertheless, there are signifi
Externí odkaz:
https://doaj.org/article/c9f966b5fd8c4825bff7c93cac1ecbf8
Publikováno v:
IEEE Access, Vol 11, Pp 60335-60348 (2023)
The semiconductor supply chain is vulnerable to multiple security attacks, such as hardware Trojan injection, intellectual property theft, and overproduction. The notion of zero-trust (ZT)– never trust, always verify– offers a promising opportuni
Externí odkaz:
https://doaj.org/article/974f9fb2f64f450fb8d07ba267322ef8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Annals of Spiru Haret University. Economic Series. 22(1):93-110
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1034196
Autor:
Jacek Piątkowski, Sabina Szymoniak
Publikováno v:
Applied Sciences, Vol 13, Iss 23, p 12668 (2023)
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data. Each communication should be secured and protected against dishonest users’ activitie
Externí odkaz:
https://doaj.org/article/cbde8f2655be4ef9a2b67bca02facf16