29   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert    
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se... ver más
Revista: Information    Formato: Electrónico

 
en línea
Abdullah M. Almuhaideb and Huda A. Alghamdi    
The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare services. TMIS services can be provided as cloud computing services for storage and processing purpos... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Masoumeh Safkhani, Nasour Bagheri and Mahyar Shariat    
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only usin... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Masoumeh Safkhani, Nasour Bagheri and Mahyar Shariat    
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only usin... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Adarsh Kumar,Krishna Gopal,Alok Aggarwal     Pág. 179 - 187
Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identif... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Raghav V. Sampangi,Srinivas Sampalli     Pág. 44 - 56
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat ? RFID tags have severe resourc... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Vladimir Belsky,Ivan Chizhov,Anastasiya Chichaeva,Vasily Shishkin     Pág. 10 - 26
A physically unclonable function is a hardware device whose instances have several unique parameters and characteristics, i.e. it is impossible to create two instances with identical values of these characteristics due to the properties of the physical p... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Nikita Konstantinovich Chistousov, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov and Aleksandr Anatolyevich Olenev    
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Inter... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Alexandr Anatolyevich Olenev, Igor Anatolyevich Kalmykov, Vladimir Petrovich Pashintsev, Nikita Konstantinovich Chistousov, Daniil Vyacheslavovich Dukhovnyj and Natalya Igorevna Kalmykova    
Low-orbit satellite internet (LOSI) expands the scope of the Industrial Internet of Things (IIoT) in the oil and gas industry (OGI) to include areas of the Far North. However, due to the large length of the communication channel, the number of threats an... ver más
Revista: Information    Formato: Electrónico

 
en línea
Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung and Zengpeng Li    
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Georgios M. Nikolopoulos and Marc Fischlin    
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tsung-Hung Lin and Ming-Te Chen    
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampere... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Zhanar S. Kazhenova,Zhanat Ye. Kenzhebayeva     Pág. 10 - 16
The IoT opens up a vast area for creative applications that will change the world and human lives. Small, sensitive devices connected to the Internet will enable all-encompassing computing. This study describes widely accepted technologies and standards ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Nahida Islam, Md. Sazzadur Rahman, Imtiaz Mahmud, Md. Nur Amin Sifat and You-Ze Cho    
The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. The cryptography schemes ent... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Karam Eddine Bilami and Pascal LORENZ    
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nishu Gupta, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva and Ariel Teles    
The amalgamation of Vehicular Ad hoc Network (VANET) with the Internet of Things (IoT) leads to the concept of the Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent Transportation Systems (ITS), which paves the way for technologies t... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi    
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Samsul Huda, Amang Sudarsono, Tri Harsono     Pág. 115 - 140
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
L Raghavendar Raju,C R K Reddy Reddy     Pág. pp. 43 - 54
Mobile ad hoc networks (MANETs) are collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaborat... ver más

« Anterior     Página: 1 de 2     Siguiente »