Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions
Technologies such as artificial intelligence (AI), blockchain, and the Internet of Things (IoT)
have converged in driving the next wave of digital revolution. Amalgamating the …
have converged in driving the next wave of digital revolution. Amalgamating the …
Blockchain-assisted secure device authentication for cross-domain industrial IoT
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary
technologies to prompt smart manufacturing and increase productivity. With manufacturing …
technologies to prompt smart manufacturing and increase productivity. With manufacturing …
BEAT: Asynchronous BFT made practical
We present BEAT, a set of practical Byzantine fault-tolerant (BFT) protocols for completely
asynchronous environments. BEAT is flexible, versatile, and extensible, consisting of five …
asynchronous environments. BEAT is flexible, versatile, and extensible, consisting of five …
Dynamic searchable symmetric encryption
Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that
this data can still be searched. The most immediate application of SSE is to cloud storage …
this data can still be searched. The most immediate application of SSE is to cloud storage …
A survey on heterogeneous federated learning
Federated learning (FL) has been proposed to protect data privacy and virtually assemble
the isolated data silos by cooperatively training models among organizations without …
the isolated data silos by cooperatively training models among organizations without …
[كتاب][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
[كتاب][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[كتاب][B] Foundations of cryptography: volume 2, basic applications
O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …
computing systems that address security concerns. The design of cryptographic systems …
[كتاب][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …