Security considerations and guidelines for augmented reality implementation in corporate environments
OO Oyewole, OG Fakeyede, EC Okeleke… - Computer Science & IT …, 2023 - fepbl.com
This research paper explores the intricate tapestry of security considerations in integrating
augmented reality (AR) within corporate landscapes. The journey begins with an in-depth …
augmented reality (AR) within corporate landscapes. The journey begins with an in-depth …
Trusted lightweight communication for IoT systems using hardware security
A Durand, P Gremaud, J Pasquier… - Proceedings of the 9th …, 2019 - dl.acm.org
This paper explores cutting-edge techniques for protecting cryptographic keys in Internet of
Things (IoT) systems based on web protocols. In this context, we evaluated the use of …
Things (IoT) systems based on web protocols. In this context, we evaluated the use of …
Security-Gateway for SCADA-Systems in Critical Infrastructures
T Frauenschläger, J Mottok - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor
components within the energy grid, playing a significant role in the stability of the system. As …
components within the energy grid, playing a significant role in the stability of the system. As …
Application study of hardware-based security for future industrial IoT
R Matischek, B Bara - 2019 22nd Euromicro Conference on …, 2019 - ieeexplore.ieee.org
The stepwise evolution of conventional production facilities into future Smart Factory or
Industrial IoT paradigms entails special requirements on future industrial devices and …
Industrial IoT paradigms entails special requirements on future industrial devices and …
Improved model of quantum deterministic protocol implementation in channel with noise
AE Qoussini, YI Daradkeh, SM Al Tabib… - 2019 10th IEEE …, 2019 - ieeexplore.ieee.org
Traditional cryptographic methods have persistence, which are based on the alleged
impossibility of solving a certain mathematical problem for a polynomial time. As an …
impossibility of solving a certain mathematical problem for a polynomial time. As an …
Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks
F Bozkurt, M Kara, MA Aydın… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
The expansion of computer networks and the increase in information sharing over the
internet platform have raised the issue of data security during transmission. SSL (Secure …
internet platform have raised the issue of data security during transmission. SSL (Secure …
Preserving location privacy in cyber-physical systems
The trending technological research platform is Internet of Things (IoT) and most probably it
will stay that way for a while. One of the main application areas of IoT is Cyber-Physical …
will stay that way for a while. One of the main application areas of IoT is Cyber-Physical …
Proof-Of-Activity Consensus Protocol based on a Network's Active Nodes
R Belfer, A Kashtalian, A Nicheporuk, G Markowsky… - 2020 - scholarsmine.mst.edu
The paper proposes a new socially oriented protocol that avoids pseudo-decentralization
and monopolization of the network, increases the availability of the system, provides a fair …
and monopolization of the network, increases the availability of the system, provides a fair …
[PDF][PDF] Assessing Security Risks Method in E-Commerce System for IT Portfolio Management.
The article analyses the main methods and means of assessing the risks of information
security systems in the field of in e-commerce IT projects and programs and ways of …
security systems in the field of in e-commerce IT projects and programs and ways of …
Analysis of Vulnerability Characteristics for Automated Penetration Testing
Y Stefinko, A Piskozub, A Obshta - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
A report on the analysis of statistical data on vulnerabilities from public data sources has
been presented to develop a mathematical model for penetration testing. Current trends in …
been presented to develop a mathematical model for penetration testing. Current trends in …