Supply Chain Finance (SCF) refers to the financial service in which banks rely on core enterprises to manage the capital flow and logistics of upstream and downstream enterprises. SCF adopts a self-testing and closed-loop credit model to control funds and ...
As IoT applications gain widespread adoption, it becomes important to design and implement IoT protocols with security. Existing research in protocol security reveals that the majority of disclosed protocol vulnerabilities are caused by incorrectly impleme ...
While the number of IoT devices grows at an exhilarating pace their security remains stagnant. Imposing secure coding standards across all vendors is infeasible. Testing individual devices allows an analyst to evaluate their security post deployment. Any d ...
Privacy is a major concern in RFID systems, especially with widespread deployment of wireless-enabled interconnected personal devices e.g. PDAs and mobile phones, credit cards, e-passports, even clothing and tires. An RFID authentication protocol should no ...
The intelligent building, a major smart city research and development domain, has grown beyond the scope of automation, currently focusing on the occupant centered approaches and the ancillary services offered to the power grid. The Internet of Things (IoT ...