122   Artículos

« Anterior     Página: 1 de 7     Siguiente »

 
en línea
Ivan Vaccari, Maurizio Aiello and Enrico Cambiaso    
The security of Internet of Things environments is a critical and trending topic, due to the nature of the networks and the sensitivity of the exchanged information. In this paper, we investigate the security of the Message Queue Telemetry Transport (MQT... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zhanar S. Kazhenova,Zhanat Ye. Kenzhebayeva     Pág. 10 - 16
The IoT opens up a vast area for creative applications that will change the world and human lives. Small, sensitive devices connected to the Internet will enable all-encompassing computing. This study describes widely accepted technologies and standards ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Giuseppe Nebbione and Maria Carla Calzarossa    
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Karen Avila, Daladier Jabba and Javier Gomez    
The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT networks have evolved around the wireless sensor network (WSN), and the following research looks at relevant IoT concepts and the different security issues that ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Masoumeh Safkhani, Nasour Bagheri and Mahyar Shariat    
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only usin... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Masoumeh Safkhani, Nasour Bagheri and Mahyar Shariat    
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only usin... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo    
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert    
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yukun Zhou, Ningsheng Wu, Baidong Hu, Yitao Zhang, Jingyun Qiu and Weiming Cai    
Face recognition payment is a new type of payment method, with AI face recognition technology as the core, and its speed and convenience are more in line with the users? payment habits. However, the face is a biological feature with weak privacy, and the... ver más
Revista: Information    Formato: Electrónico

 
en línea
Konstantinos Tsiknas, Dimitrios Taketzis, Konstantinos Demertzis and Charalabos Skianis    
In today?s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data str... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Luca Roffia, Paolo Azzoni, Cristiano Aguzzi, Fabio Viola, Francesco Antoniazzi and Tullio Salmon Cinotti    
This paper presents a decentralized Web-based architecture designed to support the development of distributed, dynamic, context-aware and interoperable services and applications. The architecture enables the detection and notification of changes over the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Luca Roffia, Paolo Azzoni, Cristiano Aguzzi, Fabio Viola, Francesco Antoniazzi and Tullio Salmon Cinotti    
This paper presents a decentralized Web-based architecture designed to support the development of distributed, dynamic, context-aware and interoperable services and applications. The architecture enables the detection and notification of changes over the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xiaojuan Chen and Huiwen Deng    
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Salekul Islam    
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protoco... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Abdullah M. Almuhaideb and Huda A. Alghamdi    
The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare services. TMIS services can be provided as cloud computing services for storage and processing purpos... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Anant Sujatanagarjuna, Arne Bochem and Benjamin Leiding    
Protocol flaws such as the well-known Heartbleed bug, security and privacy issues or incomplete specifications, in general, pose risks to the direct users of a protocol and further stakeholders. Formal methods, such as Colored Petri Nets (CPNs), facilita... ver más
Revista: Information    Formato: Electrónico

 
en línea
N.A. Naraliyev,D.I. Samal     Pág. 94 - 104
IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Jinze Du, Chengtai Gao and Tao Feng    
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Teh-Lu Liao, Hong-Ru Lin, Pei-Yen Wan and Jun-Juh Yan    
In recent years, Internet of Things (IoT) has developed rapidly and been widely used in industry, agriculture, e-health, smart cities, and families. As the total amount of data transmission will increase dramatically, security will become a very importan... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 7     Siguiente »