The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) ...
Abstract: The Internet of Things (IoT) is resource-constrained and faces the challenge of ensuring information authentication due to the continuous exchange of information between multiple physical ...
Abstract: With the rise of intelligent transportation, various mobile value-added services can be provided by the service provider (SP) in the Internet of Vehicles (IoV). To guarantee the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results