We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 3,191 results
  1. Email Security

    Emails were not designed with cyber-attack protection in mind, making them an attractive target for cybercriminals. A primary attack vector is...
    Chapter Open access 2023
  2. Full Post-Quantum Datagram TLS Handshake in the Internet of Things

    Quantum computers are a threat to the current standards for secure communication. The Datagram Transport Layer Security (DTLS) protocol is a common...
    Callum McLoughlin, Clémentine Gritti, Juliet Samandari in Codes, Cryptology and Information Security
    Conference paper 2023
  3. Transport Layer Security

    This is the only chapter in this book dealing with the security of information transfer. The need for secure information transfer in modern...
    Drago Hercog in Communication Protocols
    Chapter 2020
  4. Enhancing Security in Intelligent Transport Systems: A Blockchain-Based Approach for IoT Data Management

    In intelligent transport systems (ITS), an interconnected Internet of things (IoT) device operates autonomously, collecting and exchanging data...
    Chinmaya Kumar Dehury, Iwada Eja in Learning Techniques for the Internet of Things
    Chapter 2024
  5. MySQL Security

    In this chapter, we will discuss MySQL database security best practices and how to protect your database once you install/set up the database.
    Y V Ravi Kumar, Arun Kumar Samayam, Naresh Kumar Miryala in Mastering MySQL Administration
    Chapter 2024
  6. Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol

    Trusted channels are important when communication requires end-point integrity assurance in addition to secure channel guarantees. To facilitate...
    Arto Niemi, Vasile Adrian Bogdan Pop, Jan-Erik Ekberg in Secure IT Systems
    Conference paper 2021
  7. Layered Symbolic Security Analysis in  \(\textsf {DY}^\star \)

    While cryptographic protocols are often analyzed in isolation, they are typically deployed within a stack of protocols, where each layer relies on...
    Karthikeyan Bhargavan, Abhishek Bichhawat, ... Tim Würtele in Computer Security – ESORICS 2023
    Conference paper 2024
  8. Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing

    In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...

    K. Sundar, S. Sasikumar, ... S. karthick in Multimedia Tools and Applications
    Article 24 April 2023
  9. A hybrid algorithm-based optimization protocol to ensure data security in the cloud

    Cloud computing security involves the procedures, technologies, and policies that protect data, applications, and resources in cloud computing...

    Swaleha Zubair, Haitham M. A. Ahmed in International Journal of Information Technology
    Article 23 October 2023
  10. Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability

    Software-defined perimeters (SDP) revolutionize network security by offering dynamic and adaptive access controls, focusing on user and device...

    Antonio Paya, Vicente-García, Alberto Gómez in International Journal of Information Security
    Article 20 May 2024
  11. KEMTLS vs. Post-quantum TLS: Performance on Embedded Systems

    TLS is ubiquitous in modern computer networks. It secures transport for high-end desktops and low-end embedded devices alike. However, the public key...
    Conference paper 2022
  12. Analyze quantum security in software design using fuzzy-AHP

    Quantum Security is a conceptual phenomenon of security that uses the quantum mechanical concept in computing. Superposition and entanglement are the...

    Article 15 June 2024
  13. Post-quantum security design for hierarchical healthcare systems based on lattices

    The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks,...

    Manel Boujelben, Mohamed Abid in The Journal of Supercomputing
    Article 25 April 2024
  14. IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things

    Most widely-used protocols for end-to-end security, such as TLS and its datagram variant DTLS, are highly computation-intensive and introduce...
    Hao Cheng, Georgios Fotiadis, ... Peter Y. A. Ryan in Mobile, Secure, and Programmable Networking
    Conference paper 2024
  15. TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments

    We present TC4SE, a trusted channel mechanism suitable for secure enclave-based trusted execution environments, such as Intel SGX, that leverages the...
    Gilang Mentari Hamidy, Sri Yulianti, ... Wouter Joosen in Information Security
    Conference paper 2023
  16. Multipath TLS 1.3

    In a multipath key exchange protocol (Costea et al., CCS’18) the parties communicate over multiple connection lines, implemented for example with the...
    Marc Fischlin, Sven-André Müller, ... Lars Porth in Computer Security – ESORICS 2021
    Conference paper 2021
  17. Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies

    With the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home...

    W. M. A. B. Wijesundara, Joong-Sun Lee, ... Takashi Obi in International Journal of Information Security
    Article Open access 07 March 2024
  18. Information Security

    In an era marked by digital interconnection, the importance of information security cannot be overstated. This chapter delves into the realm of...
    Chapter 2024
  19. Integrating and Evaluating Quantum-safe TLS in Database Applications

    Quantum computing promises to build computers capable of solving complex problems much faster than today’s computers. This will benefit to many...
    Anselme Tueno, David Boehm, Shin Ho Choe in Data and Applications Security and Privacy XXXVI
    Conference paper 2022
  20. Chuchotage: In-line Software Network Protocol Translation for (D)TLS

    The growing diversity of connected devices leads to complex network deployments, often made up of endpoints that implement incompatible network...
    Pegah Nikbakht Bideh, Nicolae Paladi in Information and Communications Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.