Security considerations and guidelines for augmented reality implementation in corporate environments

OO Oyewole, OG Fakeyede, EC Okeleke… - Computer Science & IT …, 2023 - fepbl.com
This research paper explores the intricate tapestry of security considerations in integrating
augmented reality (AR) within corporate landscapes. The journey begins with an in-depth …

Trusted lightweight communication for IoT systems using hardware security

A Durand, P Gremaud, J Pasquier… - Proceedings of the 9th …, 2019 - dl.acm.org
This paper explores cutting-edge techniques for protecting cryptographic keys in Internet of
Things (IoT) systems based on web protocols. In this context, we evaluated the use of …

Security-Gateway for SCADA-Systems in Critical Infrastructures

T Frauenschläger, J Mottok - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor
components within the energy grid, playing a significant role in the stability of the system. As …

Application study of hardware-based security for future industrial IoT

R Matischek, B Bara - 2019 22nd Euromicro Conference on …, 2019 - ieeexplore.ieee.org
The stepwise evolution of conventional production facilities into future Smart Factory or
Industrial IoT paradigms entails special requirements on future industrial devices and …

Improved model of quantum deterministic protocol implementation in channel with noise

AE Qoussini, YI Daradkeh, SM Al Tabib… - 2019 10th IEEE …, 2019 - ieeexplore.ieee.org
Traditional cryptographic methods have persistence, which are based on the alleged
impossibility of solving a certain mathematical problem for a polynomial time. As an …

Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks

F Bozkurt, M Kara, MA Aydın… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
The expansion of computer networks and the increase in information sharing over the
internet platform have raised the issue of data security during transmission. SSL (Secure …

Preserving location privacy in cyber-physical systems

I Butun, P Österberg, M Gidlund - 2019 IEEE Conference on …, 2019 - ieeexplore.ieee.org
The trending technological research platform is Internet of Things (IoT) and most probably it
will stay that way for a while. One of the main application areas of IoT is Cyber-Physical …

Proof-Of-Activity Consensus Protocol based on a Network's Active Nodes

R Belfer, A Kashtalian, A Nicheporuk, G Markowsky… - 2020 - scholarsmine.mst.edu
The paper proposes a new socially oriented protocol that avoids pseudo-decentralization
and monopolization of the network, increases the availability of the system, provides a fair …

[PDF][PDF] Assessing Security Risks Method in E-Commerce System for IT Portfolio Management.

M Bublyk, V Vysotska, L Chyrun, V Panasyuk… - IntelITSIS, 2021 - ceur-ws.org
The article analyses the main methods and means of assessing the risks of information
security systems in the field of in e-commerce IT projects and programs and ways of …

Analysis of Vulnerability Characteristics for Automated Penetration Testing

Y Stefinko, A Piskozub, A Obshta - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
A report on the analysis of statistical data on vulnerabilities from public data sources has
been presented to develop a mathematical model for penetration testing. Current trends in …