All Stories

  1. Security of protocols used in Wireless Sensors Networks
  2. An IoT System for Air Pollution Monitoring with Safe Data Transmission
  3. Safe data transmission in IoT system for air pollution monitoring
  4. Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
  5. Trustworthy Artificial Intelligence Methods for Users’ Physical and Environmental Security: A Comprehensive Review
  6. Air Pollution Monitoring and Information Distribution System
  7. Blockchain Technology in Medical Data Processing: A Study on Its Applications and Potential Benefits
  8. Key Agreement and Authentication Protocols in the Internet of Things: A Survey
  9. User Authentication Protocol Based on the Location Factor for a Mobile Environment
  10. Amelia—A new security protocol for protection against false links
  11. SAT and SMT-Based Verification of Security Protocols Including Time Aspects
  12. Security protocols analysis including various time parameters
  13. Time Influence on Security Protocol
  14. Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories
  15. SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols
  16. A Fast Method for Security Protocols Verification
  17. KaoChow Protocol Timed Analysis
  18. Network’s Delays in Timed Analysis of Security Protocols
  19. On Some Time Aspects in Security Protocols Analysis
  20. The Impact of Time Parameters on the Security Protocols Correctness
  21. SAT-based verification of NSPK protocol including delays in the network
  22. Timed Analysis of Security Protocols
  23. Timed models of security protocols including delays in the network
  24. ProToc—An Universal Language for Security Protocols Specifications
  25. Parallel Bounded Model Checking of Security Protocols