ARTÍCULO
TITULO

SECURING THE WIRELESS INTERNET - The authors present their experiences in implementing and using standard security mechanisms and protocols on small wireless devices. Their results show that SSL is a practical solution for ensuring end-to-end security of

Gupta    
Vipul    
Gupta    
Sumit    

Resumen

No disponible

 Artículos similares

       
 
Abhay Singh, Ankush Ganesh, Rutuja Rajendra Patil, Sumit Kumar, Ruchi Rani and Sanjeev Kumar Pippal    
Voting is a democratic process that allows individuals to choose their leaders and voice their opinions. However, the current situation with physical voting involves long queues, paper-based ballots, and security challenges. Blockchain-based voting model... ver más

 
Manal Rajeh AlShalaan and Suliman Mohamed Fati    
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th... ver más
Revista: Information

 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information

 
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro    
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ... ver más
Revista: Applied Sciences

 
Usman Javed Butt, Osama Hussien, Krison Hasanaj, Khaled Shaalan, Bilal Hassan and Haider al-Khateeb    
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks. One way to ensure network security is by usin... ver más
Revista: Algorithms