|
|
|
Jiaxing Wu, Nian Xue, Zhen Li, Xianbin Hong, Yilin Zhao, Xin Huang and Jie Zhang
The access control system is a critical element in intelligent buildings. In this paper, we present SPCL, an innovative access control system designed to facilitate building entry through the use of mobile phones. Our system aims to provide a secure and ...
ver más
|
|
|
|
|
|
|
Messaoud Benguenane, Ahmed Korichi, Bouziane Brik and Nadjet Azzaoui
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of...
ver más
|
|
|
|
|
|
|
Mira Lee and Minhye Seo
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This...
ver más
|
|
|
|
|
|
|
Firas Najjar, Qusay Bsoul and Hasan Al-Refai
Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on t...
ver más
|
|
|
|
|
|
|
Ivan Nedyalkov
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ...
ver más
|
|
|
|
|
|
|
Hendrik Ballhausen and Ludwig Christian Hinske
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulat...
ver más
|
|
|
|
|
|
|
Seyed Mohammad Hashemi, Ruxandra Mihaela Botez and Georges Ghazi
This paper introduces an innovative consensus algorithm for managing Unmanned Aircraft System Traffic (UTM) through blockchain technology, a highly secure consensus protocol, to allocate airspace. A smart contract was developed on the Ethereum blockchain...
ver más
|
|
|
|
|
|
|
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system...
ver más
|
|
|
|
|
|
|
Naythan Villafuerte, Santiago Manzano, Paulina Ayala and Marcelo V. García
Due to the similarities in symptomatology between COVID-19 and other respiratory infections, diagnosis of these diseases can be complicated. To address this issue, a web application was developed that employs a chatbot and artificial intelligence to dete...
ver más
|
|
|
|
|
|
|
Nuwan Weerasinghe, Muhammad Arslan Usman, Chaminda Hewage, Eckhard Pfluegel and Christos Politis
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, secur...
ver más
|
|
|
|