A Survey on Cyber–Physical Systems Security
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …
computing, control, and communication technologies, bridging the cyberspace and physical …
Systematic survey of mobile payments, protocols, and security infrastructure
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shop** …
are widely used by smartphones for utility payments, bill payments, and online shop** …
SoK: Design, vulnerabilities and defense of cryptocurrency wallets
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
[HTML][HTML] Near-field communication (NFC) cyber threats and mitigation solutions in payment transactions: A review
P Onumadu, H Abroshan - Sensors, 2024 - mdpi.com
Today, many businesses use near-field communications (NFC) payment solutions, which
allow them to receive payments from customers quickly and smoothly. However, this …
allow them to receive payments from customers quickly and smoothly. However, this …
Secure UHF RFID authentication with smart devices
Commodity ultra-high-frequency (UHF) RFID authentication systems only provide weak user
authentication, as RFID tags can be easily stolen, lost, or cloned by attackers. This paper …
authentication, as RFID tags can be easily stolen, lost, or cloned by attackers. This paper …
Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model
H Yin - Journal of Information Security and Applications, 2023 - Elsevier
Today, Bluetooth technology has become the primary means of short-distance. In the
Bluetooth protocol stack, the Secure Simple Pairing (SSP) specifies three methods to …
Bluetooth protocol stack, the Secure Simple Pairing (SSP) specifies three methods to …
Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures
Blockchain technology transformed the digital sphere by providing a transparent, secure,
and decentralized platform for data security across a range of industries, including …
and decentralized platform for data security across a range of industries, including …
Internet of things security requirements, threats, attacks, and countermeasures
M Abdel-Basset, N Moustafa, H Hawash… - … learning techniques for …, 2022 - Springer
This chapter elaborates on different security aspects to be taken into accounts during the
development and the deployments of IoT architecture. To make the reader about the security …
development and the deployments of IoT architecture. To make the reader about the security …
Long-range over-a-meter NFC link budget with distributed large-area coils
Near-field communication is considered to have a high level of hardware security protection
owing to its natural short-range wireless operation, which makes a man-in-the-middle attack …
owing to its natural short-range wireless operation, which makes a man-in-the-middle attack …
Towards securing public-key storage using hyperledger fabric
When given a cryptographic public verification key, a receiver needs to be sure about the
authenticity of the sender. Whenever an adversary is able to replace a well-intended public …
authenticity of the sender. Whenever an adversary is able to replace a well-intended public …