The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, people have witnessed a remarkable growth in the number of smart wearable devices. Accompanied with the development of a contactless data transmission technique, the lack of effective secret key establishment between lightweight wearable devices which support contactless data transmission technique becomes a security bottleneck. In this paper, we propose a novel wireless key establishment...
Due to the broadcast nature of the wireless medium, private communications are easily eavesdropped. This has spurred extensive research into secret key establishment using physical layer characteristics of wireless channels. In all these schemes, the shared secret keys directly originate from the physical features of the real wireless channel, which is highly dependent on the communication environment...
The power flow model for DC power grids has been used theoretically to launch false data injection attacks (FDIAs) against state estimation. We recognize FDIAs are just one possible attack using the power flow model and that the grid topology information within the model implies its discovery may also facilitate topology-based attacks. We show attackers can derive the power flow model, and thus the...
The prevalence and monetary value of mobile devices, coupled with their compact and, indeed, mobile nature, lead to frequent theft due to a lack of proper anti-theft mechanisms. Currently there only exist damage control efforts such as remote wiping the device's memory or GPS tracking, but nothing to notify users of theft while it takes place. We propose such a mechanism which utilizes the unique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.