Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022‏ - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions

KJ Raval, NK Jadav, T Rathod, S Tanwar… - International journal of …, 2024‏ - Elsevier
Technologies such as artificial intelligence (AI), blockchain, and the Internet of Things (IoT)
have converged in driving the next wave of digital revolution. Amalgamating the …

Blockchain-assisted secure device authentication for cross-domain industrial IoT

M Shen, H Liu, L Zhu, K Xu, H Yu, X Du… - IEEE Journal on …, 2020‏ - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary
technologies to prompt smart manufacturing and increase productivity. With manufacturing …

BEAT: Asynchronous BFT made practical

S Duan, MK Reiter, H Zhang - Proceedings of the 2018 ACM SIGSAC …, 2018‏ - dl.acm.org
We present BEAT, a set of practical Byzantine fault-tolerant (BFT) protocols for completely
asynchronous environments. BEAT is flexible, versatile, and extensible, consisting of five …

Dynamic searchable symmetric encryption

S Kamara, C Papamanthou, T Roeder - … of the 2012 ACM conference on …, 2012‏ - dl.acm.org
Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that
this data can still be searched. The most immediate application of SSE is to cloud storage …

A survey on heterogeneous federated learning

D Gao, X Yao, Q Yang - arxiv preprint arxiv:2210.04505, 2022‏ - arxiv.org
Federated learning (FL) has been proposed to protect data privacy and virtually assemble
the isolated data silos by cooperatively training models among organizations without …

[كتاب][B] Understanding cryptography

C Paar, J Pelzl - 2010‏ - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

[كتاب][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018‏ - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[كتاب][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001‏ - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

[كتاب][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007‏ - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …