305   Artículos

« Anterior     Página: 1 de 16     Siguiente »

 
en línea
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan    
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Peter Kieseberg, Sebastian Schrittwieser and Edgar Weippl    
The data market concept has gained a lot of momentum in recent years, fuelled by initiatives to set up such markets, e.g., on the European level. Still, the typical data market concept aims at providing a centralised platform with all of its positive and... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ramamurthi Deeptha,Rajeswari Mukesh     Pág. 8 - 14
Single sign-on (SSO) is an emerging and more secure authentication mechanism that enables an authorized user with a single username/password to be authenticated by many service providers in a distributed network system. The existing technique used SSO sc... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu and Kivudujogappa Lingappa Hemalatha    
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of bi... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Bao Zhou, Junsan Zhao, Guoping Chen and Ying Yin    
With the popularity of spatiotemporal big data applications, more and more sensitive data are generated by users, and the sharing and secure storage of spatiotemporal big data are faced with many challenges. In response to these challenges, the present p... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono     Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Mira Lee and Minhye Seo    
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muhammad Bin Saif, Sara Migliorini and Fausto Spoto    
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mahmoud Elkhodr, Samiya Khan and Ergun Gide    
In the modern digital landscape of the Internet of Things (IoT), data interoperability and heterogeneity present critical challenges, particularly with the increasing complexity of IoT systems and networks. Addressing these challenges, while ensuring dat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ivan Nedyalkov    
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany    
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Peng Xi, Xinglong Zhang, Lian Wang, Wenjuan Liu and Shaoliang Peng    
Medical data contains multiple records of patient data that are important for subsequent treatment and future research. However, it needs to be stored and shared securely to protect the privacy of the data. Blockchain is widely used in the management of ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shamim Younas, Faisal Rehman, Tahir Maqsood, Saad Mustafa, Adnan Akhunzada and Abdullah Gani    
Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving as well as semi-automobile vehicles. Such vehicles rely heavily on data management and the exchange of Cooperative Awareness Messages (CAMs) for external communica... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Muhammad Firdaus and Kyung-Hyune Rhee    
The conventional architecture of vehicular ad hoc networks (VANETs) with a centralized approach has difficulty overcoming the increasing complexity of intelligent transportation system (ITS) applications as well as challenges in providing large amounts o... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nishu Gupta, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva and Ariel Teles    
The amalgamation of Vehicular Ad hoc Network (VANET) with the Internet of Things (IoT) leads to the concept of the Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent Transportation Systems (ITS), which paves the way for technologies t... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono     Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Seonghyeon Gong, Abir EL Azzaoui, Jeonghun Cha and Jong Hyuk Park    
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices. This architecture ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar    
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei... ver más

« Anterior     Página: 1 de 16     Siguiente »