ThinkMind // International Journal On Advances in Security, volume 9, numbers 3 and 4, 2016
Notes: A free access journal featuring works submitted on an invitation basis only.
Event editions: - there are 26 editions.
Articles: there are 10 articles
On the Resilience of a QKD Key Synchronization Protocol for IPsec
Stefan Marksteiner, Benjamin Rainer, and Oliver Maurhart
keywords: Quantum Key Distribution; QKD; IPsec; Cryptography; Security; Networks
Prospects of Software-Defined Networking in Industrial Operations
keywords: automation; infrastructure; manageability; configuration; life-cycle; DCS; SDN; engineering; path computation.
Fuzzbomb: Fully-Autonomous Detection and Repair of Cyber Vulnerabilities
David J. Musliner, Scott E. Friedman, Michael Boldt, J. Benton, Max Schuchard, Peter Keller, and Stephen McCamant
keywords: autonomous cyber defense; symbolic analysis; protocol learning; binary rewriting
A Risk Assessment of Logical Attacks on a CEN/XFS-based ATM Platform
Johannes Braeuer, Bernadette Gmeiner, and Johannes Sametinger
keywords: ATM security; logical ATM attacks; XFS; embedded system security; risk assessment.
Stabilizing Breach-Free Sensor Barriers
Jorge Cobb and Chin-Tser Huang
keywords: Stabilization; Sensor networks; Sensor barriers.
Data Security Overview for Medical Mobile Apps Assuring the Confidentiality, Integrity and Availability of data in transmission
Ceara Treacy and Fergal McCaffery
keywords: Mobile Medical Apps; data security; Mobile Medical Apps data regulations.
Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm
Keith Mayes, Stephen Babbage, and Alexander Maximov
keywords: 3GPP; GSM; Keccak; SAGE; TUAK;
Cloud Cyber-Security: Empowering the Audit Trail
Bob Duncan and Mark Whittington
keywords: cloud cyber-security; compliance; assurance; audit; audit trail.
Collaborative and Secure Sharing of Healthcare Records Using Attribute-Based Authenticated Access
Mohamed Abomhara and Huihui Yang
keywords: Healthcare; Access control; Authorization; Collaboration environments; Attribute based authentication.
Bernhard Tellenbach, Sergio Paganoni, and Marc Rennhard