|
|
|
Ahmed Bahaa, Ahmed Abdelaziz, Abdalla Sayed, Laila Elfangary and Hanan Fahmy
In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of...
ver más
|
|
|
|
|
|
Pavel Smirnov,Stanislav Smyshlyaev
Pág. 77 - 84
The task of providing security to remote digital signature systems (?cloud? signature) for cases of end user running client-side components on devices without potential of ensuring trusted environment (most common examples of such devices are smartphones...
ver más
|
|
|
|
|
|
Nicolas Guillou, Jean-Frédéric Charpentier and Mohamed Benbouzid
Refined assessments of the available tidal stream energy resource are required to optimize turbines design and guarantee successful implementations and operations of devices in the marine environment. Investigations primary focused on identifying areas w...
ver más
|
|
|
|
|
|
Yu-Jie (Jessica) Kuo and Jiann-Cherng Shieh
The advent and rapid rise of network technology and cloud computing have led to new opportunities for ushering in a new era in telehealth. Thanks to the Internet of Things (IoT) and advances in 5G communication, telehealth is expanding and shows no signs...
ver más
|
|
|
|
|
|
Adnan Mohsin Abdulazeez,Baraa Wasfi Salim,Diyar Qader Zeebaree,Dana Doghramachi
Pág. pp. 157 - 177
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly hi...
ver más
|
|
|