Search
Search Results
-
Email Security
Emails were not designed with cyber-attack protection in mind, making them an attractive target for cybercriminals. A primary attack vector is... -
Full Post-Quantum Datagram TLS Handshake in the Internet of Things
Quantum computers are a threat to the current standards for secure communication. The Datagram Transport Layer Security (DTLS) protocol is a common... -
Transport Layer Security
This is the only chapter in this book dealing with the security of information transfer. The need for secure information transfer in modern... -
Enhancing Security in Intelligent Transport Systems: A Blockchain-Based Approach for IoT Data Management
In intelligent transport systems (ITS), an interconnected Internet of things (IoT) device operates autonomously, collecting and exchanging data... -
MySQL Security
In this chapter, we will discuss MySQL database security best practices and how to protect your database once you install/set up the database. -
Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol
Trusted channels are important when communication requires end-point integrity assurance in addition to secure channel guarantees. To facilitate... -
Layered Symbolic Security Analysis in \(\textsf {DY}^\star \)
While cryptographic protocols are often analyzed in isolation, they are typically deployed within a stack of protocols, where each layer relies on... -
Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing
In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...
-
A hybrid algorithm-based optimization protocol to ensure data security in the cloud
Cloud computing security involves the procedures, technologies, and policies that protect data, applications, and resources in cloud computing...
-
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability
Software-defined perimeters (SDP) revolutionize network security by offering dynamic and adaptive access controls, focusing on user and device...
-
KEMTLS vs. Post-quantum TLS: Performance on Embedded Systems
TLS is ubiquitous in modern computer networks. It secures transport for high-end desktops and low-end embedded devices alike. However, the public key... -
Analyze quantum security in software design using fuzzy-AHP
Quantum Security is a conceptual phenomenon of security that uses the quantum mechanical concept in computing. Superposition and entanglement are the...
-
Post-quantum security design for hierarchical healthcare systems based on lattices
The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks,...
-
IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things
Most widely-used protocols for end-to-end security, such as TLS and its datagram variant DTLS, are highly computation-intensive and introduce... -
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments
We present TC4SE, a trusted channel mechanism suitable for secure enclave-based trusted execution environments, such as Intel SGX, that leverages the... -
Multipath TLS 1.3
In a multipath key exchange protocol (Costea et al., CCS’18) the parties communicate over multiple connection lines, implemented for example with the... -
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies
With the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home...
-
Information Security
In an era marked by digital interconnection, the importance of information security cannot be overstated. This chapter delves into the realm of... -
Integrating and Evaluating Quantum-safe TLS in Database Applications
Quantum computing promises to build computers capable of solving complex problems much faster than today’s computers. This will benefit to many... -
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
The growing diversity of connected devices leads to complex network deployments, often made up of endpoints that implement incompatible network...