Skip Content
You are currently on the new version of our website. Access the old version .

8 Results Found

  • Article
  • Open Access
16 Citations
3,238 Views
15 Pages

9 May 2023

Cross-domain authentication requires that there is no trust gap between different trust domains that can cause cross-domain devices to exceed the security control scope of the original trust domain and further expose cross-domain authentication syste...

  • Article
  • Open Access
18 Citations
3,770 Views
27 Pages

12 June 2020

Emerging as the effective strategy of intelligent transportation system (ITS), vehicular ad hoc networks (VANETs) have the capacity of drastically improving the driving experience and road safety. In typical VANET scenarios, high mobility and volatil...

  • Article
  • Open Access
694 Views
20 Pages

29 June 2025

As the Internet of Things (IoT) continues to evolve, the demand for cross-domain collaboration between devices and data sharing has grown significantly. Operations confined to a single trust domain can no longer satisfy this requirement, so cross-dom...

  • Article
  • Open Access
833 Views
26 Pages

24 May 2025

Multi-hop inter-domain wireless networks play a vital role in future heterogeneous communication systems by improving data transmission efficiency and security assurance. Despite the advances in secure routing techniques in areas such as node authent...

  • Article
  • Open Access
17 Citations
2,330 Views
14 Pages

5 June 2023

With the advancement of smart devices, the operation and communication of smart grids have become increasingly efficient. Many smart devices such as smart meters, smart transformers, and smart grid controllers are already widely used in smart grids....

  • Article
  • Open Access
5 Citations
2,403 Views
20 Pages

9 March 2024

Secure group communication in Vehicle Ad hoc Networks (VANETs) over open channels remains a challenging task. To enable secure group communications with conditional privacy, it is necessary to establish a secure session using Authenticated Key Agreem...

  • Article
  • Open Access
1,583 Views
22 Pages

BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain

  • Yingying Ma,
  • Chaowen Chang,
  • Ping Wu,
  • Jingxu Xiao and
  • Lu Yuan

The security requirements for SDN (Software-Defined Network) cross-domain communication are diverse and dynamically changing; thus, a security service negotiation function is required for the SDN interdomain. However, the SDN interdomain distributed...

  • Review
  • Open Access
854 Views
22 Pages

Exploring the Security of Mobile Face Recognition: Attacks, Defenses, and Future Directions

  • Elísabet Líf Birgisdóttir,
  • Michał Ignacy Kunkel,
  • Lukáš Pleva,
  • Maria Papaioannou,
  • Gaurav Choudhary and
  • Nicola Dragoni

17 December 2025

Biometric authentication on smartphones has advanced rapidly in recent years, with face recognition becoming the dominant modality due to its convenience and easy integration with modern mobile hardware. However, despite these developments, smartphon...