We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 3,191 results
  1. Internet of Things Integrated with Multi-level Authentication for Secured IoT Data Stream Through TLS/SSL Layer

    With the advancement in recent technology, the world is connected to multiple devices or peripherals through the Internet of things (IoT). Therefore,...
    S. Yuvaraj, M. Manigandan, ... S. Nikhilesh in Big-Data-Analytics in Astronomy, Science, and Engineering
    Conference paper 2022
  2. Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3

    The common approach in secure communication channel protocols is to rely on ciphertexts arriving in-order and to close the connection upon any rogue...

    Marc Fischlin, Felix Günther, Christian Janson in Journal of Cryptology
    Article Open access 30 January 2024
  3. A Security Policy Engine for Building Energy Management Systems

    This paper presents a Policy Engine for securing building energy management systems (BEMSs), a class of industrial control systems (ICSs) requiring...
    Jiahui Lim, Wenshei Ong, ... Ertem Esiner in Applied Cryptography and Network Security Workshops
    Conference paper 2023
  4. Security

    As an enterprise Linux administrator, security is of the utmost importance. System or security breaches can spell financial doom for any organization...
    Kenneth Hitchcock in The Enterprise Linux Administrator
    Chapter 2023
  5. Use of hybrid post-quantum key exchange in internet protocols

    This article describes the current situation with incorporating hybrid post-quantum key exchange into the internet security protocols taking TLS 1.3...

    Article 16 March 2024
  6. A Survey on Security Issues of SDN Controllers

    Software Defined Network (SDN) separates the data layer and control layer of traditional networks, achieving efficient logical centralized control...
    Rui Wang, Youhuizi Li, ... Yangyang Li in Frontiers of Networking Technologies
    Conference paper 2024
  7. Privacy and security federated reference architecture for Internet of Things

    Physical objects are getting connected to the Internet at an exceptional rate, making the idea of the Internet of Things (IoT) a reality. The IoT...

    Musab Kamal, Imran Rashid, ... Ijaz Ahmad in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2023
  8. TCP, UDP und QUIC Internals Protokolle und Programmierung

    Das Lehrbuch vermittelt praxisbezogen wichtige Grundkonzepte der Datenkommunikation mit einem Fokus auf den wichtigsten Transportprotokollen des...

    Peter Mandl
    Textbook 2024
  9. Cryptographic Systems Technologies

    Using the building blocks from the previous chapter, this chapter puts them together in two example systems. One of these, Transport Layer Security...
    Seth James Nielson in Discovering Cybersecurity
    Chapter 2023
  10. Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks

    The proposed Blockchain-Based Mitigation of Deauthentication Attacks (BBMDA) Framework aims to enhance the security and trustworthiness of IoT...

    S. Harihara Gopalan, A. Manikandan, ... G. Sujatha in International Journal of Networked and Distributed Computing
    Article Open access 28 May 2024
  11. Discussion on a new paradigm of endogenous security towards 6G networks

    The sixth-generation mobile communication (6G) networks will face more complex endogenous security problems, and it is urgent to propose new...

    **nsheng Ji, Jiangxing Wu, ... **g Yang in Frontiers of Information Technology & Electronic Engineering
    Article 24 October 2022
  12. Transport Layer Security

    Die Grundidee von SSL/TLS besteht darin, einen transparenten, verschlüsselten und authentifizierten Kanal zur Verfügung zu stellen, über den...
    Chapter 2020
  13. Network Security

    This chapter presents a number of common ways of protecting systems against various forms of attack via the network. These include:...
    Chapter 2024
  14. Hel** novice developers harness security issues in cloud-IoT systems

    The development of cloud-connected Internet of Things (IoT) systems is becoming more and more affordable, even to novice programmers, thanks to...

    Fulvio Corno, Luigi De Russis, Luca Mannella in Journal of Reliable Intelligent Environments
    Article Open access 13 May 2022
  15. BlockFaaS: Blockchain-enabled Serverless Computing Framework for AI-driven IoT Healthcare Applications

    With the development of new sensor technologies, Internet of Things (IoT)-based healthcare applications have gained momentum in recent years....

    Muhammed Golec, Sukhpal Singh Gill, ... Steve Uhlig in Journal of Grid Computing
    Article 03 November 2023
  16. Communications and Network Security

    In the ever-evolving landscape of information technology, Communications and Network Security is a vital domain in professional practice and a...
    Mohamed Aly Bouke in CISSP Exam Certification Companion
    Chapter 2023
  17. Implement Security

    Security is paramount when considering which data store to implement for your organization’s critical applications. Cloud-native services greatly...
    Chapter 2023
  18. Infrastructure Security Patterns

    Organizations typically focus on building applications and data-driven software to harvest the value from their data. To create secure and reliable...
    Chapter 2023
  19. Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker

    Advancements in computing and communication technology have increased the number of devices connected to the Internet, leading to the emergence of...

    Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan in The Journal of Supercomputing
    Article 01 December 2023
  20. Transparent Security Method for Automating IoT Security Assessments

    People and businesses are dependent on the security of the Internet of Things (IoT). Vendor-independent security assessment and certification intends...
    Rauli Kaksonen, Kimmo Halunen, ... Juha Röning in Information Security Practice and Experience
    Conference paper 2023
Did you find what you were looking for? Share feedback.