Search
Search Results
-
Security Verification
Security of a system on chip (SoC) can be weakened by exploiting the inherent and potential vulnerabilities of the intellectual property (IP) cores... -
An improved blockchain framework for ORAP verification and data security in healthcare
Currently, the move from traditional healthcare to smart healthcare systems is greatly aided by current technology. Healthcare proposes a new...
-
SoC Security Verification Using Fuzz, Penetration, and AI Testing
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the tremendous modernization of these architectures. For a modern... -
RETRACTED ARTICLE: Verification and modeling of IoT time automata for gateway security system
Internet of Things (IoT) is a multiple heterogeneous network, and its perception layer is often faced with various security threats. As the bridge...
-
CAD for Hardware/Software Security Verification
Security validation and verification have become challenging due to the complexity of the modern system-on-chip (SoC) design. Existing verification... -
A formal security analysis of the fast authentication procedure based on the security context in 5G networks
The security context, generally stored in the universal subscriber identity module card or the baseband chip, is the critical information applied by...
-
An efficient group signature based certificate less verification scheme for vehicular ad-hoc network
Vehicular ad-hoc network (VANET) is widely applied in transportation applications to ensure safety and security during road transportation. In VANET,...
-
Verification
This chapter emphasizes the critical need for thorough verification of embedded systems, building upon the advantages of SystemC models outlined in... -
Metrics for SoC Security Verification
Due to the persistency of hardware vulnerabilities, they are generally considered harder to resolve than software vulnerabilities. Accordingly, it is... -
A Bilinear Map** Based Ring Signature Scheme with Batch Verification for Applications in VANETs
Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation...
-
Security assessment and improvement of building ethernet KNXnet/IP protocol
KNXnet/IP is a KNX-building automation protocol that communicates through an IP network. It is mainly used in the field of smart home and building...
-
Non-Invasive Hardware Trojans Modeling and Insertion: A Formal Verification Approach
In modern chip designs, shared resources are used extensively. Arbiters usage is crucial to settle conflicts when multiple requests compete for these...
-
An improved lattice based certificateless data integrity verification techniques for cloud computing
Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be...
-
Cancelable templates for secure face verification based on deep learning and random projections
Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address...
-
Vulnerability issues in Automatic Speaker Verification (ASV) systems
Claimed identities of speakers can be verified by means of automatic speaker verification (ASV) systems, also known as voice biometric systems....
-
3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things
The Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely...
-
Attentional multi-feature fusion for spoofing-aware speaker verification
The Spoofing-Aware Speaker Verification (SASV) system is designed to protect automatic speaker verification (ASV) systems from potential speech...
-
Hybrid Internet of Things (IoT) data transmission security corresponding to device verification
The Internet Of Things (IoT) devices are popular and deployed generally. Due to the wireless data transmission between each IoT device and remote...
-
An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques
Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET...
-
Enhancing Anonymity of Internet of Vehicle Identities in Connected Vehicle Security Services Using Batch Verification Algorithm
This paper proposes a solution for enhancing the anonymity of Internet of vehicle identities in the security services of connected vehicles, which...