ARTÍCULO
TITULO

Some Attacks Against Vehicles Passive Entry Security Systems and Their Solutions

Alrabady    
A. I. Mahmud    
S. M.    

Resumen

No disponible

 Artículos similares

       
 
Mario Alviano    
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi... ver más
Revista: Algorithms

 
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang    
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu... ver más
Revista: Applied Sciences

 
Yongli Tang, Deng Pan, Panke Qin and Liping Lv    
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde... ver más
Revista: Applied Sciences

 
Jawhara Boodai, Aminah Alqahtani and Mounir Frikha    
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate and connect to the internet. However, as with any new technology, 5G networks also bring new security challenges that need to be addressed. One of the key areas of co... ver más
Revista: Applied Sciences

 
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng    
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate... ver más
Revista: Computers