|
|
|
Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is ...
ver más
|
|
|
|
|
|
|
Fuxiao Zhou, Yanping Li and Yong Ding
Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure communicat...
ver más
|
|
|
|
|
|
|
William J. Buchanan, David Lanc, Elochukwu Ukwandu, Lu Fan, Gordon Russell and Owen Lo
The Public Key Infrastructure (PKI) is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret shari...
ver más
|
|
|
|
|
|
|
Carlos Camargo B., Javier Sáenz, Nelson Felipe Rosas
Pág. 28 - 38
La Integración de la red eléctrica y las tecnologías de la información y las comunicaciones (TIC) es el futuro de la energía, el mundo moderno no puede ser concebido sin electricidad y la infraestructura actual está mal adaptada a las necesidades actuale...
ver más
|
|
|
|
|
|
|
Muhannad Anwar Al-Shboul,Izzat Mahmoud Alsmadi
Pág. pp. 18 - 24
Many countries around the world are trying to build and enhance their internet infrastructure and utilize services related to the Internet such as e-Commerce, information connectivity, accessibility, etc. However, studies indicated that network and hardw...
ver más
|
|
|
|
|
|
|
Danielle Wilde and Jenny Underwood
New materials with new capabilities demand new ways of approaching design. Destabilising existing methods is crucial to develop new methods. Yet, radical destabilisation?where outcomes remain unknown long enough that new discoveries become possible?is no...
ver más
|
|
|
|
|
|
|
Renee Carnley and Sikha Bagui
The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digital ...
ver más
|
|
|
|
|
|
|
Adeel Abro, Zhongliang Deng and Kamran Ali Memon
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational an...
ver más
|
|
|
|
|
|
|
Ghizlane MOUKHLISS,Olaf MALASSE,RedaFilali Hilali,Hicham Belhadaoui
Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the m...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Fabian Honecker, Julian Dreyer and Ralf Tönjes
Modern Public Key Infrastructures (PKIs) allow users to create and maintain centrally stored cryptographic certificates. These infrastructures use a so-called certificate chain. At the root of the chain, a root Certification Authority (CA) is responsible...
ver más
|
|
|
|
|
|
|
Serhii Yevseiev,Olena Rayevnyeva,Volodymir Ponomarenko,Oleksandr Milov
Pág. 6 - 28
Innovative activity of universities and the formation of entrepreneur universities of the innovative type is one of the forms of integration of the higher education systems of countries into the world educational and scientific space, support of their co...
ver más
|
|
|
|
|
|
|
Usama Salama, Lina Yao and Hye-young Paik
The presence of the Internet of Things (IoT) in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient?s status....
ver más
|
|
|
|