Buscar
Mostrando ítems 1-3 de 3
Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks
(Institute of Electrical and Electronics Engineers, 2020-01-23)
[Abstract] Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, ...
Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era
(MDPI AG, 2020-08-13)
[Abstract]
Industry 4.0 and Industrial Internet of Things (IIoT) are paradigms that are driving current industrial revolution by connecting to the Internet industrial machinery, management tools or products so as to control ...
Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
(MDPI AG, 2020-05-27)
[Abstract] Shodan is a search engine for exploring the Internet and thus finding connected devices. Its main use is to provide a tool for cybersecurity researchers and developers to detect vulnerable Internet-connected ...