All Stories

  1. Security protocol for securing notifications about dangerous events in the agglomeration
  2. Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols
  3. Review of Monitoring and Control Systems Based on Internet of Things
  4. AI-Based Enhancing of the Smart City Residents' Safety
  5. Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols
  6. Open Source Intelligence Opportunities and Challenges: a Review
  7. Security of protocols used in Wireless Sensors Networks
  8. An IoT System for Air Pollution Monitoring with Safe Data Transmission
  9. Safe data transmission in IoT system for air pollution monitoring
  10. Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
  11. Trustworthy Artificial Intelligence Methods for Users’ Physical and Environmental Security: A Comprehensive Review
  12. Air Pollution Monitoring and Information Distribution System
  13. Blockchain Technology in Medical Data Processing: A Study on Its Applications and Potential Benefits
  14. Key Agreement and Authentication Protocols in the Internet of Things: A Survey
  15. User Authentication Protocol Based on the Location Factor for a Mobile Environment
  16. Amelia—A new security protocol for protection against false links
  17. SAT and SMT-Based Verification of Security Protocols Including Time Aspects
  18. Security protocols analysis including various time parameters
  19. Time Influence on Security Protocol
  20. Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories
  21. SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols
  22. A Fast Method for Security Protocols Verification
  23. KaoChow Protocol Timed Analysis
  24. Network’s Delays in Timed Analysis of Security Protocols
  25. On Some Time Aspects in Security Protocols Analysis
  26. The Impact of Time Parameters on the Security Protocols Correctness
  27. SAT-based verification of NSPK protocol including delays in the network
  28. Timed Analysis of Security Protocols
  29. Timed models of security protocols including delays in the network
  30. ProToc—An Universal Language for Security Protocols Specifications
  31. Parallel Bounded Model Checking of Security Protocols