The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) ...
Abstract: The Internet of Things (IoT) is resource-constrained and faces the challenge of ensuring information authentication due to the continuous exchange of information between multiple physical ...
Abstract: With the rise of intelligent transportation, various mobile value-added services can be provided by the service provider (SP) in the Internet of Vehicles (IoV). To guarantee the ...