|
|
|
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se...
ver más
|
|
|
|
|
|
|
Abdullah M. Almuhaideb and Huda A. Alghamdi
The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare services. TMIS services can be provided as cloud computing services for storage and processing purpos...
ver más
|
|
|
|
|
|
|
Masoumeh Safkhani, Nasour Bagheri and Mahyar Shariat
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only usin...
ver más
|
|
|
|
|
|
|
Masoumeh Safkhani, Nasour Bagheri and Mahyar Shariat
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only usin...
ver más
|
|
|
|
|
|
|
Adarsh Kumar,Krishna Gopal,Alok Aggarwal
Pág. 179 - 187
Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identif...
ver más
|
|
|
|
|
|
|
Raghav V. Sampangi,Srinivas Sampalli
Pág. 44 - 56
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat ? RFID tags have severe resourc...
ver más
|
|
|
|
|
|
|
Vladimir Belsky,Ivan Chizhov,Anastasiya Chichaeva,Vasily Shishkin
Pág. 10 - 26
A physically unclonable function is a hardware device whose instances have several unique parameters and characteristics, i.e. it is impossible to create two instances with identical values of these characteristics due to the properties of the physical p...
ver más
|
|
|
|
|
|
|
Nikita Konstantinovich Chistousov, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov and Aleksandr Anatolyevich Olenev
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Inter...
ver más
|
|
|
|
|
|
|
Alexandr Anatolyevich Olenev, Igor Anatolyevich Kalmykov, Vladimir Petrovich Pashintsev, Nikita Konstantinovich Chistousov, Daniil Vyacheslavovich Dukhovnyj and Natalya Igorevna Kalmykova
Low-orbit satellite internet (LOSI) expands the scope of the Industrial Internet of Things (IIoT) in the oil and gas industry (OGI) to include areas of the Far North. However, due to the large length of the communication channel, the number of threats an...
ver más
|
|
|
|
|
|
|
Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung and Zengpeng Li
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it...
ver más
|
|
|
|
|
|
|
Georgios M. Nikolopoulos and Marc Fischlin
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used...
ver más
|
|
|
|
|
|
|
Tsung-Hung Lin and Ming-Te Chen
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampere...
ver más
|
|
|
|
|
|
|
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system...
ver más
|
|
|
|
|
|
|
Zhanar S. Kazhenova,Zhanat Ye. Kenzhebayeva
Pág. 10 - 16
The IoT opens up a vast area for creative applications that will change the world and human lives. Small, sensitive devices connected to the Internet will enable all-encompassing computing. This study describes widely accepted technologies and standards ...
ver más
|
|
|
|
|
|
|
Nahida Islam, Md. Sazzadur Rahman, Imtiaz Mahmud, Md. Nur Amin Sifat and You-Ze Cho
The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. The cryptography schemes ent...
ver más
|
|
|
|
|
|
|
Karam Eddine Bilami and Pascal LORENZ
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their...
ver más
|
|
|
|
|
|
|
Nishu Gupta, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva and Ariel Teles
The amalgamation of Vehicular Ad hoc Network (VANET) with the Internet of Things (IoT) leads to the concept of the Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent Transportation Systems (ITS), which paves the way for technologies t...
ver más
|
|
|
|
|
|
|
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ...
ver más
|
|
|
|
|
|
|
Samsul Huda, Amang Sudarsono, Tri Harsono
Pág. 115 - 140
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile...
ver más
|
|
|
|
|
|
|
L Raghavendar Raju,C R K Reddy Reddy
Pág. pp. 43 - 54
Mobile ad hoc networks (MANETs) are collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaborat...
ver más
|
|
|
|