Modular Framework for Constructing IoT-Server AKE in Post-Quantum Setting | 0 | 0.34 | 2022 |
Challenges of post-quantum digital signing in real-world applications: a survey | 0 | 0.34 | 2022 |
Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution | 0 | 0.34 | 2022 |
zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs | 0 | 0.34 | 2022 |
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens | 0 | 0.34 | 2022 |
Securing Password Authentication for Web-based Applications | 0 | 0.34 | 2022 |
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X | 0 | 0.34 | 2022 |
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid | 0 | 0.34 | 2022 |
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices | 0 | 0.34 | 2022 |
Enabling isolation and recovery in PLC redundancy framework of metro train systems | 0 | 0.34 | 2021 |
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems | 0 | 0.34 | 2021 |
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things | 1 | 0.36 | 2021 |
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. | 0 | 0.34 | 2021 |
Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT | 0 | 0.34 | 2021 |
Transparent Electricity Pricing with Privacy | 0 | 0.34 | 2021 |
A Policy-Based Reinforcement Learning Approach for High-Speed Railway Timetable Rescheduling. | 0 | 0.34 | 2021 |
Shaping Blockchain Technology For Securing Supply Chains | 0 | 0.34 | 2021 |
Server-Aided Bilateral Access Control For Secure Data Sharing With Dynamic User Groups | 0 | 0.34 | 2021 |
Plcrypto: A Symmetric Cryptographic Library For Programmable Logic Controllers | 0 | 0.34 | 2021 |
Modeling Social Worm Propagation For Advanced Persistent Threats | 0 | 0.34 | 2021 |
Attacks on smart grid: power supply interruption and malicious power generation | 0 | 0.34 | 2020 |
A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS | 2 | 0.39 | 2020 |
Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader | 0 | 0.34 | 2020 |
Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers | 0 | 0.34 | 2020 |
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II. | 0 | 0.34 | 2020 |
A Survey of Digital Signing in the Post Quantum Era. | 0 | 0.34 | 2019 |
Careful-Packing - A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing. | 0 | 0.34 | 2019 |
Patt: Physics-Based Attestation Of Control Systems | 0 | 0.34 | 2019 |
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data. | 0 | 0.34 | 2019 |
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks. | 0 | 0.34 | 2018 |
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. | 5 | 0.40 | 2018 |
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. | 0 | 0.34 | 2018 |
Efficient privacy-preserving charging station reservation system for electric vehicles | 1 | 0.35 | 2016 |
Cyber And Physical Access Control In Legacy System Using Passwords | 0 | 0.34 | 2016 |
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database. | 2 | 0.35 | 2016 |
Complying with Security Requirements in Cloud Storage Systems. | 0 | 0.34 | 2016 |
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. | 2 | 0.36 | 2016 |
Time-Bound Anonymous Authentication for Roaming Networks | 14 | 0.56 | 2015 |
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. | 0 | 0.34 | 2015 |
Surveying the Development of Biometric User Authentication on Mobile Phones | 48 | 1.50 | 2015 |
Protecting the internet of things. | 0 | 0.34 | 2014 |
Lightweight and Privacy-Preserving Delegatable Proofs of Storage. | 0 | 0.34 | 2014 |
Collaborative agglomerative document clustering with limited information disclosure | 0 | 0.34 | 2014 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage | 41 | 1.16 | 2014 |
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks | 43 | 1.54 | 2013 |
Achieving Revocable Fine-Grained Cryptographic Access Control Over Cloud Data | 2 | 0.38 | 2013 |
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage | 38 | 1.30 | 2013 |
Launching generic attacks on iOS with approved third-party applications | 11 | 0.77 | 2013 |
An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing. | 2 | 0.36 | 2013 |
Dynamic secure cloud storage with provenance | 20 | 1.00 | 2012 |