Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
A survey of man in the middle attacks
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …
security, representing one of the biggest concerns for security professionals. MITM targets …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …
primitives, defined by rewrite rules or by equations. It can prove various security properties …
Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid
In recent years, rapid advancements in smart grid technology and smart metering systems
have raised serious privacy concerns about the collection of customers' real-time energy …
have raised serious privacy concerns about the collection of customers' real-time energy …
Privacy and data protection by design-from policy to engineering
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
[KIRJA][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
A performance evaluation of local descriptors
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
[KIRJA][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …