30   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Qiang Li    
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The automatic identification system (AIS), despite its importance in worldwide navigation at sea, does not provide any defence mechanisms against deliberate misuse, e.g., by sea pirates, terrorists, business adversaries, or smugglers. Previous work has p... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Qihong Yu, Jiguo Li and Sai Ji    
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of cryptographic systems. Since no existing anonymous broadcast encryption scheme can resist the si... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hanae Mgarbi,Mohamed Yassin Chkouri,Abderrahim Tahiri     Pág. 37 - 42
Before the development of the web, we talk about the portfolio; it was represented by a simple portfolio of student skills in paper form. This form of representation of skills and professional career has continued to develop over the years. After a succe... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Hanae Mgarbi,Mohamed Yassin Chkouri,Abderrahim Tahiri     Pág. 37 - 42
Before the development of the web, we talk about the portfolio; it was represented by a simple portfolio of student skills in paper form. This form of representation of skills and professional career has continued to develop over the years. After a succe... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Qingnan Chen, Ting Wu, Chengnan Hu, Anbang Chen and Qiuhua Zheng    
Cross-domain authenticated asymmetric group key agreement allows group members in different domains to establish a secure group communication channel and the senders can be anyone. However, the existing schemes do not meet the requirement of batch verifi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nikos Fotiou and George C. Polyzos    
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fuxiao Zhou, Yanping Li and Yong Ding    
Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure communicat... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Maria Romero,Angel Mauricio Mujica Sanchez,Edgardo Pineda,Yesenia Ccamapaza,Nohely Zavalla     Pág. 166 - 178
Molecular markers based on simple sequence repeats (SSRs) constitute a highly effective instrument in the identification of quinoa genotypes (Chenopodium quinoa), and they are very useful in the management and conservation of germplasm banks. T... ver más
Revista: Ciencia e Investigación Agraria    Formato: Electrónico

 
en línea
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar    
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei... ver más

 
en línea
Yueying Huang and Junjie Yang    
-
Revista: Information    Formato: Electrónico

 
en línea
Ugo Fiore and Francesco Rossi    
Digital watermarking aims at protecting multimedia content by hiding into it some data that can be used for such purposes as, for example, intellectual property protection or integrity control. Sometimes, the owner of an image would prefer to not transmi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ugo Fiore and Francesco Rossi    
Revista: Future Internet    Formato: Electrónico

 
en línea
Yitao Chen, Weiwei Han     Pág. 629 - 636
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been pr... ver más
Revista: Acta Scientiarum: Technology    Formato: Electrónico

 
en línea
Elena - Madalina VATAMANESCU,Florina PÎNZARU,Lucian Claudiu ANGHEL     Pág. 265 - 282
The paper approaches the common identity and common bond theories in analyzing the group patterns of interaction, their causes, processes and outcomes from a managerial perspective. The distinction between identity and bond referred to people?s different... ver más
Revista: Management Dynamics in the Knowledge Economy    Formato: Electrónico

 
en línea
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao    
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Luisanna Cocco, Roberto Tonelli and Michele Marchesi    
This work presents a Self Sovereign Identity based system proposal to show how Blockchain, Building Information Modeling, Internet of Thing devices, and Self Sovereign Identity concepts can support the process of building digitalization, guaranteeing the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Luisanna Cocco, Roberto Tonelli and Michele Marchesi    
This work presents how a digital identity management system can support food supply chains in guaranteeing the quality of the products marketed and the compliance of the several supply-chain?s nodes to standards and technical regulations. Specific goal o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ruth Tsuria    
This study explores the relationship between politics and religion, resistance and community, on social media through the case study of #EmptyThePews. #EmptyThePews was created in August 2017 after the events in Charlottesville, calling users who attend ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »