default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 438 matches
- 2025
- Mohammed Al-Khalidi, Rabab Al-Zaidi, Tarek Ali, Safiullah Khan, Ali Kashif Bashir:
AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security. Ad Hoc Networks 166: 103669 (2025) - José Manuel Bernabé Murcia, Eduardo Cánovas, Jesús García Rodríguez, Alejandro Molina Zarca, Antonio F. Skarmeta:
Decentralised Identity Management solution for zero-trust multi-domain Computing Continuum frameworks. Future Gener. Comput. Syst. 162: 107479 (2025) - Prasanta Kumar Roy, Pankaj Kumar, Ansuman Bhattacharya:
ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systems. Future Gener. Comput. Syst. 163: 107520 (2025) - 2024
- Gwanghyun Ahn, Jisoo Jang, Seho Choi, Dongkyoo Shin:
Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix. IEEE Access 12: 89291-89309 (2024) - Faris Alsulami, Akshay R. Kulkarni, Noor Ahmad Hazari, Mohammed Y. Niamat:
ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI Security. IEEE Access 12: 119868-119883 (2024) - Ikram Ud Din, Kamran Habib Khan, Ahmad Almogren, Mahdi Zareei, Jesús Arturo Pérez Díaz:
Securing the Metaverse: A Blockchain-Enabled Zero-Trust Architecture for Virtual Environments. IEEE Access 12: 92337-92347 (2024) - Gregory Falco, Nathaniel G. Gordon:
A Zero-Trust Satellite Services Marketplace Enabling Space Infrastructure as a Service. IEEE Access 12: 71066-71075 (2024) - Akshay R. Kulkarni, Noor Ahmad Hazari, Mohammed Y. Niamat:
A Zero Trust-Based Framework Employing Blockchain Technology and Ring Oscillator Physical Unclonable Functions for Security of Field Programmable Gate Array Supply Chain. IEEE Access 12: 89322-89338 (2024) - Nurun Nahar, Karl Andersson, Olov Schelén, Saguna Saguna:
A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks. IEEE Access 12: 94753-94764 (2024) - Pooja S, C. B. Chandrakala:
Secure Reviewing and Data Sharing in Scientific Collaboration: Leveraging Blockchain and Zero Trust Architecture. IEEE Access 12: 92386-92399 (2024) - Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall:
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control. IEEE Access 12: 129611-129622 (2024) - Bader Zyoud, Syaheerah Lebai Lutfi:
The Role of Information Security Culture in Zero Trust Adoption: Insights From UAE Organizations. IEEE Access 12: 72420-72444 (2024) - Danish Javeed, Muhammad Shahid Saeed, Muhammad Adil, Prabhat Kumar, Alireza Jolfaei:
A federated learning-based zero trust intrusion detection system for Internet of Things. Ad Hoc Networks 162: 103540 (2024) - Faria Nawshin, Devrim Unal, Mohammad Hammoudeh, Ponnuthurai N. Suganthan:
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks. Ad Hoc Networks 161: 103523 (2024) - Claudio Zanasi, Silvio Russo, Michele Colajanni:
Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures. Ad Hoc Networks 156: 103414 (2024) - Javier Jose Diaz Rivera, Waleed Akbar, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:
Zt &t: secure service session management using blockchain-based tokens in zero trust networks. Ann. des Télécommunications 79(7-8): 487-505 (2024) - Anamika Singh, Rajesh Kumar Dhanaraj, Anupam Kumar Sharma:
Personalized device authentication scheme using Q-learning-based decision-making with the aid of transfer fuzzy learning for IIoT devices in zero trust network (PDA-QLTFL). Comput. Electr. Eng. 118: 109435 (2024) - Raül Ramos Fernández:
Evaluation of trust service and software product regimes for zero-knowledge proof development under eIDAS 2.0. Comput. Law Secur. Rev. 53: 105968 (2024) - Ruizhi Cheng, Songqing Chen, Bo Han:
Toward Zero-Trust Security for the Metaverse. IEEE Commun. Mag. 62(2): 156-162 (2024) - Belal Ali, Mark A. Gregory, Shuo Li, Omar Amjad Dib:
Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in Multi-access Edge Computing. Comput. Networks 241: 110197 (2024) - Jenny Heino, Christian Jalio, Antti Hakkala, Seppo Virtanen:
JAPPI: An unsupervised endpoint application identification methodology for improved Zero Trust models, risk score calculations and threat detection. Comput. Networks 250: 110606 (2024) - Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Yu-an Tan, Quanxin Zhang, Yuanzhang Li:
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Comput. Networks 245: 110376 (2024) - P. Sumanprakash, K. Seshadri Ramana, Renzon Daniel Cosmepecho, M. Janardhan, Meryelem Tania Churampi Arellano, J. Mahalakshmi, M. Bhavsingh, K. Samunnisa:
Learning-driven Continuous Diagnostics and Mitigation program for secure edge management through Zero-Trust Architecture. Comput. Commun. 220: 94-107 (2024) - Malak Annabi, Abdelhafid Zeroual, Nadhir Messai:
Towards zero trust security in connected vehicles: A comprehensive survey. Comput. Secur. 145: 104018 (2024) - Cornelius Itodo, Murat Ozer:
Multivocal literature review on zero-trust security implementation. Comput. Secur. 141: 103827 (2024) - Quan Shen, Yanming Shen:
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach. Comput. Secur. 136: 103537 (2024) - Michael T. Swearingen, James Bret Michael, Joseph Weiss, Robert Radvanovsky:
Resilient Without Zero Trust. Computer 57(1): 120-122 (2024) - Rajesh Kumar Dhanaraj, Anamika Singh, Anand Nayyar:
Matyas-Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network. Computing 106(6): 1933-1962 (2024) - Eduardo B. Fernández, Andrei Brazhuk:
A critical analysis of Zero Trust Architecture (ZTA). Comput. Stand. Interfaces 89: 103832 (2024) - Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu:
Dissecting zero trust: research landscape and its implementation in IoT. Cybersecur. 7(1): 20 (2024)
skipping 408 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-01 18:07 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint