supported by National Natural Science Foundation of China(Grant Nos.62122092,62032005)。
The SM9 identity-based encryption(IBE)scheme is a cryptographic standard used in China,and has been incorporated into the ISO/IEC standard in 2021.This work primarily proposes a countermeasure to secure the SM9 IBE sc...
supported in part by the Research Committee of Hamdard University Karachi Pakistan(www.hamdard.edu.pk);the Office of Research Innovation&Commercialization(ORIC)of Dawood University of Engineering&Technology Karachi Pakistan(www.duet.edu.pk).
Software-Defined Networking(SDN)is a new network technology that uses programming to complement the data plane with a control plane.To enable safe connection,however,numerous security challenges must be addressed.Floo...
This study pursues the objective of analyzing and verifying the knowledge of the agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College) in relation to the practical flaws resulti...
Given the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation frewalls,the concept of a next generation firewall is at a breaking point.It is bec...
specific grant from any funding agency in public,commercial or not-for-profit sectors.
Internet of Things(IoT)security is the act of securing IoT devices and networks.IoT devices,including industrial machines,smart energy grids,and building automation,are extremely vulnerable.With the goal of shielding ...
In the information age, computer network technology has made great progress. The Internet has become an indispensable part of the lives of hundreds of millions of Internet users. The problem of network security has ev...
This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of Sy...
This research has been supported by the National Science Foundation(under grant#1723596);the National Security Agency(under grant#H98230-17-1-0355).
Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physi...