Searched for: +
(1 - 20 of 62)

Pages

document
Li, H. (author)
Electronic devices have permeated into all aspects of our lives, from basic smart cards to sophisticated hybrid automobile systems. These devices comprise a range of products like sensors, wearable gadgets, mobile phones, personal computers, and others, playing vital roles in many applications and enabling the Internet of Things (IoT). However,...
doctoral thesis 2024
document
Yang, Zhe (author), Liu, Zhou (author), Zhang, Qi (author), Chen, Zhe (author), de Jesus Chavez, Jose (author), Popov, M. (author)
The traditional fault control strategy of converter-interfaced renewable energy sources (CIRESs) may bring about a lower sensitivity level or misoperation of fault component-based directional elements. To overcome this problem, a new control scheme is proposed to adjust sequence impedance angles of CIRESs by computing suitable current...
journal article 2023
document
Mariot, L. (author), Picek, S. (author), R Yorgova, R.A. (author)
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a McEliece-type cryptosystem using large minimum distance error-correcting codes derived from...
journal article 2023
document
Ahmadvand, Hossein (author), Lal, C. (author), Hemmati, Hadi (author), Sookhak, Mehdi (author), Conti, M. (author)
In recent years, the use of Software Defined Networking (SDN) has increased due to various network management requirements. Using SDN in computer network applications has brought several benefits to users, including lower operational costs, better hardware management, flexibility, and centralized network deployment. On the other hand, the...
journal article 2023
document
Chen, E. (author), Zhu, Yan (author), Liang, K. (author), Yin, Hongjian (author)
The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach of sensitive data. Aiming at this concern, we present a new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Access Control Markup Language (ABAC/XACML) model, client-side Ciphertext...
journal article 2023
document
Jansen, B.A. (author), Kadenko, N.I. (author), Broeders, Dennis (author), van Eeten, M.J.G. (author), Borgolte, K. (author), Fiebig, T. (author)
In just a few years, the issue of “digital sovereignty” has emerged as an important security issue for governments across the globe, reflecting a growing unease about the security risks associated with government services that depend on foreign service providers for digital infrastructure and traffic routing. This work investigates to which...
journal article 2023
document
Gordijn, Daan (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the...
conference paper 2023
document
Grishkov, I. (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user’s data that is being uploaded to the distributed ledger. A new extension to the self-encryption scheme was deployed by integrating data owner’s identity into the...
conference paper 2023
document
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...
journal article 2023
document
El-Zawawy, Mohamed A. (author), Lal, C. (author), Conti, M. (author)
With the rapid technological advancement in the Internet of Things (IoT) and Internet of Vehicles (IoV), we witness exponential growth of Connected and Autonomous Vehicles (CAVs). However, these integrations of IoV with other technologies make the IoV network and its interaction between different network components highly complex. Therefore,...
journal article 2023
document
de Vos, Adriaan (author), Brighente, Alessandro (author), Conti, M. (author)
IEEE 802.1CB provides a standard for reliable packet delivery within Time-Sensitive Networking (TSN). As this standard is envisioned to be used in mission-critical networks in the near future, it has to be protected against security threats. The integrity of the network communication should be the biggest focus as guaranteed delivery is...
conference paper 2023
document
Wei, Xiaoguang (author), Liu, Y. (author), Shi, Jian (author), Gao, Shibin (author), Li, Xingpeng (author), Han, Zhu (author)
This article offers a novel perspective on identifying the critical branches under load redistribution (LR) attacks. Compared to the existing literature that is largely disruption-driven and based on dc state estimation, we propose to address the threat from LR attacks on a more fundamental level by modeling and analyzing the circulation of...
journal article 2023
document
Iaiani, Matteo (author), Tugnoli, Alessandro (author), Cozzani, Valerio (author), Reniers, G.L.L.M.E. (author), Yang, M. (author)
Offshore Oil&Gas facilities are attractive targets of intentional malicious attacks (security attacks) that may trigger cascading events (e.g., the release and dispersion of hazardous material and/or energy, fires, explosions) with consequences on people, environment, and assets. The severity of these consequences is potentially similar to...
journal article 2023
document
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...
journal article 2023
document
di Angelo, Monika (author), Durieux, T. (author), Ferreira, João F. (author), Salzer, Gernot (author)
Smart contracts are blockchain programs that often handle valuable assets. Writing secure smart contracts is far from trivial, and any vulnerability may lead to significant financial losses. To support developers in identifying and eliminating vulnerabilities, methods and tools for the automated analysis of smart contracts have been proposed....
conference paper 2023
document
He, Daojing (author), Du, Runmeng (author), Zhu, Shanshan (author), Zhang, Min (author), Liang, K. (author), Chan, Sammy (author)
Data island effectively blocks the practical application of machine learning. To meet this challenge, a new framework known as federated learning was created. It allows model training on a large amount of scattered data owned by different data providers. This article presents a parallel solution for computing logistic regression based on...
journal article 2022
document
Pirani, Mohammad (author), Baldi, S. (author), Johansson, Karl Henrik (author)
This paper presents a comprehensive study on the impact of information flow topologies on the resilience of distributed algorithms that are widely used for estimation and control in vehicle platoons. In the state of the art, the influence of information flow topology on both internal and string stability of vehicle platoons has been well...
journal article 2022
document
Yu, Xinghuo (author), Tang, Changbing (author), Palensky, P. (author), Colombo, Armando (author)
Imagine you want to send money to a friend overseas. Wouldn't it be good if you didn't have to pay hefty fees to the intermediaries, and your friend received the funds very quickly? Now imagine ordering parts to make a product in your manufacturing plant. Wouldn't it be great if you were able to verify where each part comes from and have...
journal article 2022
document
Comes, M. (author), Alexander, David (author), Boin, Arjen (author), Eckert, Claudia (author), Elmqvist, Thomas (author), Fochesato, Mattia (author), Helbing, Dirk (author), Latusek-Jurczak, Dominika (author), Lauta, Kristian (author), Meriläinen, Eija (author), Nikkari, Simo (author), Papadimitratos, Panos (author), Renn, Ortwin (author), Rios Insua, David (author), Rizza, Caroline (author), Zio, Enrico (author)
The evidence review report from SAPEA presents the latest scientific evidence on the subject of crisis management, and evidence-based policy options for action.<br/><br/>The European Union is confronted with an increasing number of crises with growing complexity. Their effects can cascade and ripple to all parts of society, the economy, and the...
book 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
Searched for: +
(1 - 20 of 62)

Pages