[1]
|
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice
ACM Computing Surveys,
2023
DOI:10.1145/3534967
|
|
|
[2]
|
An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems
IEEE Transactions on Network and Service Management,
2022
DOI:10.1109/TNSM.2021.3104531
|
|
|
[3]
|
Timed automata as a formalism for expressing security: A survey on theory and practice
ACM Computing Surveys,
2022
DOI:10.1145/3534967
|
|
|
[4]
|
RPL Authenticated Mode Evaluation: Authenticated Key Exchange and Network Behavioral
2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN),
2022
DOI:10.1109/ICUFN55119.2022.9829601
|
|
|
[5]
|
A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
Journal of Sensor and Actuator Networks,
2022
DOI:10.3390/jsan11030052
|
|
|
[6]
|
Security and Privacy in the Internet of Things
2021
DOI:10.1002/9781119607755.ch4
|
|
|
[7]
|
Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC
IEEE Systems Journal,
2020
DOI:10.1109/JSYST.2019.2933464
|
|
|
[8]
|
A study of Secure cryptographic based Hardware security module in a cloud environment
2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC),
2020
DOI:10.1109/I-SMAC49090.2020.9243328
|
|
|
[9]
|
A Novel Approach towards Secure IO Transactions Implementation and Validation for Smart Phones
2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER),
2018
DOI:10.1109/DISCOVER.2018.8674067
|
|
|
[10]
|
A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
Cybernetics and Information Technologies,
2018
DOI:10.2478/cait-2018-0048
|
|
|
[11]
|
A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
Cybernetics and Information Technologies,
2018
DOI:10.2478/cait-2018-0048
|
|
|
[12]
|
A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
Cybernetics and Information Technologies,
2018
DOI:10.2478/cait-2018-0048
|
|
|
[13]
|
Integrated Formal Methods
Lecture Notes in Computer Science,
2017
DOI:10.1007/978-3-319-66845-1_28
|
|
|
[14]
|
Secure lightweight ECC-based protocol for multi-agent IoT systems
2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob),
2017
DOI:10.1109/WiMOB.2017.8115788
|
|
|
[15]
|
Foundations and Practice of Security
Lecture Notes in Computer Science,
2016
DOI:10.1007/978-3-319-30303-1_9
|
|
|
[16]
|
A Trusted IaaS Environment with Hardware Security Module
IEEE Transactions on Services Computing,
2016
DOI:10.1109/TSC.2015.2392099
|
|
|
[17]
|
Smart keys for cyber-cars
Proceedings of the third ACM conference on Data and application security and privacy,
2013
DOI:10.1145/2435349.2435382
|
|
|
[18]
|
Formal Verification of Secrecy in Group Key Protocols Using Event-B
International Journal of Communications, Network and System Sciences,
2012
DOI:10.4236/ijcns.2012.53021
|
|
|
[19]
|
A BSP Algorithm for On-the-Fly Checking CTL* Formulas on Security Protocols
2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies,
2012
DOI:10.1109/PDCAT.2012.12
|
|
|
[20]
|
A BSP Algorithm for On-the-fly Checking LTL Formulas on Security Protocols
2012 11th International Symposium on Parallel and Distributed Computing,
2012
DOI:10.1109/ISPDC.2012.10
|
|
|