Electric Vehicles (EVs) share common technologies with classical
fossil-...
Users today expect more security from services that handle their data. I...
Intel SGX enables memory isolation and static integrity verification of ...
Smart cities deploy large numbers of sensors and collect a tremendous am...
With the advent of the fourth industrial revolution, Programmable Logic
...
The number of Connected and Autonomous Vehicles (CAVs) is increasing rap...
Over the past few years, we have seen several cyber incidents being repo...
Traditionally, applications that are used in large and small enterprises...
Decentralized control, low-complexity, flexible and efficient communicat...
A verifiable random function (VRF in short) is a powerful pseudo-random
...
A SCADA system is a distributed network of cyber-physical devices used f...
Blockchain rewriting with fine-grained access control allows a user to c...
Smart grids leverage data from smart meters to improve operations manage...
Coronavirus Disease 2019 (COVID-19) has rapidly spread in 2020, emerging...
Programmable Logic Controllers (PLCs) are a core component of an Industr...
The use of passwords and the need to protect passwords are not going awa...
Prevention of cyber attacks on the critical network resources has become...
We present ProPoS, a Proof-of-Stake protocol dedicated, but not limited,...
In an Industrial Control System (ICS), its complex network of sensors,
a...
The integration of cyber technologies (computing and communication) with...
With more than 1.3 Billion in the cumulative number of downloads reporte...
The Internet of Things (IoT) is an emerging paradigm that allows a
fine-...
A design-centric modeling approach was proposed to model the behavior of...
Runtime remote attestation is a technique that allows to validate the co...