37   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Qiang Li    
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung and Zengpeng Li    
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xiang Chen, Shouzhi Xu, Kai Ma and Peng Chen    
A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of a co... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yongbo Jiang, Gongxue Sun and Tao Feng    
With the increasing value of various kinds of data in the era of big data, the demand of different subjects for data transactions has become more and more urgent. In this paper, a blockchain-based data transaction protection scheme is proposed to realize... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa    
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending... ver más
Revista: Information    Formato: Electrónico

 
en línea
Liangqin Gong, Daniyal M. Alghazzawi and Li Cheng    
In Internet of Things (IoT) environments, privacy and security are among some of the significant challenges. Recently, several studies have attempted to apply blockchain technology to increase IoT network security. However, the lightweight feature of IoT... ver más
Revista: Information    Formato: Electrónico

 
en línea
Laxmisha Rai,Zhiyuan Wang,Amila Rodrigo,Zhaopeng Deng,Haiqing Liu     Pág. pp. 103 - 120
With the rapid use of Android OS in mobile devices and related products, face recognition technology is an essential feature, so that mobile devices have a strong personal identity authentication. In this paper, we propose Android based software developm... ver más

 
en línea
Rafael Páez, Manuel Pérez, Gustavo Ramírez, Juan Montes and Lucas Bouvarel    
This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tsung-Hung Lin and Ming-Te Chen    
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampere... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ghizlane MOUKHLISS,Olaf MALASSE,RedaFilali Hilali,Hicham Belhadaoui    
Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the m... ver más

 
en línea
Guma Ali, Mussa Ally Dida and Anael Elikana Sam    
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Andrew John Poulter, Steven J. Ossont and Simon J. Cox    
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-c... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nikos Fotiou and George C. Polyzos    
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu    
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jing Chen, Tong Li and Rui Zhu    
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Gazmend Krasniqi, Petrit Rama and Blerim Rexha    
Today, we are witnessing increased demand for more speed and capacity in the Internet, and more processing power and storage in every end user device. Demand for greater performance is present in every system. Electronic devices and their hosted applicat... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Yi Zhao and Song-Kyoo Kim    
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shuo Zhang, Yaping Liu, Zhiyu Han and Zhikai Yang    
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention. Due to open-access communication environments, UAVs may raise security concerns, including authentic... ver más
Revista: Drones    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »