|
|
|
Keundug Park and Heung-Youl Youm
The volume of the asset investment and trading market can be expanded through the issuance and management of blockchain-based security tokens that logically divide the value of assets and guarantee ownership. This paper proposes a service model to solve ...
ver más
|
|
|
|
|
|
|
Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang and Yi-Wen Lai
The number of Internet of Things (IoT) devices has increased dramatically in recent years, and Bluetooth technology is critical for communication between IoT devices. It is possible to protect electronic communications, the Internet of Things (IoT), and ...
ver más
|
|
|
|
|
|
|
Mario Alviano
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi...
ver más
|
|
|
|
|
|
|
Amthal K. Mousa and Mohammed Najm Abdullah
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN?s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data cent...
ver más
|
|
|
|
|
|
|
Abuzar Zafar, Fahad Samad, Hassan Jamil Syed, Ashraf Osman Ibrahim, Manar Alohaly and Muna Elsadig
The internet of things (IoT) is a complex system that includes multiple technologies and services. However, its heterogeneity can result in quality-of-service (QoS) issues, which may lead to security challenges. Software-defined network (SDN) provides un...
ver más
|
|
|
|
|
|
|
Ziyad R. Alashhab, Mohammed Anbar, Manmeet Mahinderjit Singh, Iznan H. Hasbullah, Prateek Jain and Taief Alaa Al-Amiedy
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional com...
ver más
|
|
|
|
|
|
|
Mamoona Humayun, Mahmood Niazi, Maram Fahhad Almufareh, N. Z. Jhanjhi, Sajjad Mahmood and Mohammad Alshayeb
Cloud computing (CC) is the delivery of computing services on demand and is charged using a ?pay per you use? policy. Of the multiple services offered by CC, SaaS is the most popular and widely adapted service platform and is used by billions of organiza...
ver más
|
|
|
|
|
|
|
Luca Foschini, Valentina Mignardi, Rebecca Montanari and Domenico Scotece
Real-time business practices require huge amounts of data directly from the production assets. This new thirst for accurate and timely data has forced the convergence of the traditionally business-focused information technology (IT) environment with the ...
ver más
|
|
|
|
|
|
|
Franklin Tchakounté, Athanase Esdras Yera Pagor, Jean Claude Kamgang and Marcellin Atemkeng
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions. However, they are not totally e...
ver más
|
|
|
|
|
|
|
Vasiliy Elagin, Anastasia Spirkina, Andrei Levakov and Ilya Belozertsev
The present article describes the behavioral model of blockchain services; their reliability is confirmed on the basis of experimental data. The authors identify the main technical characteristics and features associated with data transmission through th...
ver más
|
|
|
|
|
|
|
Olusola Akinrolabu, Steve New and Andrew Martin
Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set of ...
ver más
|
|
|
|
|
|
|
Abdullahi Mikail and Bernardi Pranggono
The shift to Cloud computing has brought with it its specific security challenges concerning the loss of control, trust and multi-tenancy especially in Infrastructure-as-a-Service (IaaS) Cloud model. This article focuses on the design and development of ...
ver más
|
|
|
|
|
|
|
Abdullahi Mikail and Bernardi Pranggono
|
|
|
|
|
|
|
Khaled Aldiabat,Anwar Al-Gasaymeh,Ameer Sardar K.Rashid
Pág. pp. 37 - 49
Banks have changed from paper-based banking solutions provider to the latest of the technologies like mobile banking. Adoption of mobile-banking has received more attention in recent years, because there are more phones than computers in the market. But,...
ver más
|
|
|
|
|
|
|
Adrien Bonguet and Martine Bellaiche
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Denial-o...
ver más
|
|
|
|
|
|
|
Adrien Bonguet and Martine Bellaiche
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Denial-o...
ver más
|
|
|
|
|
|
|
Estian Haupt,Rudie Nel
AbstractAn intuitive approach when considering the VAT implications of a dividend cession, which relates to a share, could be to classify it as a financial service and thus exempt from VAT. The fact that debt factoring, another cession transaction, has b...
ver más
|
|
|
|
|
|
|
Umar Mukhtar Ismail, Shareeful Islam, Moussa Ouedraogo and Edgar Weippl
Individuals and corporate users are persistently considering cloud adoption due to its significant benefits compared to traditional computing environments. The data and applications in the cloud are stored in an environment that is separated, managed and...
ver más
|
|
|
|
|
|
|
Won Min Kang, Jae Dong Lee, Young-Sik Jeong and Jong Hyuk Park
Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation Sys...
ver más
|
|
|
|
|
|
|
Murat Ogul and Selçuk Baktir
Due to widespread adoption of mobile communications devices and increasingly high throughput capacity of cellular networks, Third-Generation (3G) and Long Term Evolution (LTE) are becoming ever more popular. Millions of smart phones with 3G capabilities ...
ver más
|
|
|
|