Loading…
Verifying layered security protocols
Gibson-Robinson, Thomas, Kamil, Allaa, Lowe, Gavin
Published in Journal of computer security (02.07.2015)
Published in Journal of computer security (02.07.2015)
Get full text
Journal Article
Loading…
Loading…
Loading…
A Salient Missing Link in RFID Security Protocols
Erguler, Imran, Anarim, Emin, Saldamli, Gokay
Published in EURASIP journal on wireless communications and networking (01.01.2011)
Published in EURASIP journal on wireless communications and networking (01.01.2011)
Get full text
Journal Article
Loading…
IoT Authentication Protocols: Challenges, and Comparative Analysis
Alsheavi, Amar N., Hawbani, Ammar, Othman, Wajdy, Wang, Xingfu, Qaid, Gamil, Zhao, Liang, Al-Dubai, Ahmed, Zhi, Liu, Ismail, A.s., Jhaveri, Rutvij, Alsamhi, Saeed, Al-Qaness, Mohammed A. A.
Published in ACM computing surveys (09.01.2025)
Published in ACM computing surveys (09.01.2025)
Get full text
Journal Article
Loading…
On the Unnecessary Complexity of Names in X.509 and Their Impact on Implementations
Sun, Yuteng, Debnath, Joyanta, Hong, Wenzheng, Chowdhury, Omar, Chau, Sze Yiu
Published in Proceedings of the ACM on software engineering (19.06.2025)
Published in Proceedings of the ACM on software engineering (19.06.2025)
Get full text
Journal Article
Loading…
A Salient Missing Link in RFID Security Protocols
Erguler, Imran, Anarim, Emin, Saldamli, Gokay
Published in EURASIP journal on wireless communications and networking (01.01.2011)
Published in EURASIP journal on wireless communications and networking (01.01.2011)
Get full text
Journal Article
Loading…
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
Schaller, P., Schmidt, B., Basin, D., Capkun, S.
Published in 2009 22nd IEEE Computer Security Foundations Symposium (01.07.2009)
Published in 2009 22nd IEEE Computer Security Foundations Symposium (01.07.2009)
Get full text
Conference Proceeding
Loading…
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Alnahawi, Nouri, Schmitt, Nicolai, Wiesmaier, Alexander, Zok, Chiara-Marie
Published in ACM transactions on embedded computing systems (27.03.2024)
Published in ACM transactions on embedded computing systems (27.03.2024)
Get full text
Journal Article
Loading…
An Extensive Survey on Internet of Things(IoT) Security, Risk factors, Trust Management, Security Protocols and Machine Learning Techniques
V, Ashok Kumar, Kanagachidambaresan, G. R.
Published in 2025 International Conference on Computational Robotics, Testing and Engineering Evaluation (ICCRTEE) (28.05.2025)
Published in 2025 International Conference on Computational Robotics, Testing and Engineering Evaluation (ICCRTEE) (28.05.2025)
Get full text
Conference Proceeding
Loading…
Securing the Internet of Things with Block chain-based Network Security Protocols
Marimuthu, T., Chattopadhyay, Saumitra, Parveen, H. Summia, Shukla, Rishi Prakash, Manwal, Manika, Nair, Vilas
Published in International Conference on Computing, Communication, and Networking Technologies (Online) (24.06.2024)
Published in International Conference on Computing, Communication, and Networking Technologies (Online) (24.06.2024)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Loading…
Verifying Accountability for Unbounded Sets of Participants
Morio, Kevin, Kunnemann, Robert
Published in Proceedings (IEEE Computer Security Foundations Symposium) (01.06.2021)
Published in Proceedings (IEEE Computer Security Foundations Symposium) (01.06.2021)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Security as a new dimension in embedded system design
Kocher, Paul, Lee, Ruby, McGraw, Gary, Raghunathan, Anand
Published in 2004 41st Conference Design Automation (01.01.2004)
Published in 2004 41st Conference Design Automation (01.01.2004)
Get full text
Conference Proceeding