ARTÍCULO
TITULO

A security scheme for Aglets

Ono    
K. Tai    
H.    

Resumen

No disponible

 Artículos similares

       
 
Shaonan Hou, Chengjun Lin and Shaojun Yang    
A transitive signature scheme enables anyone to obtain the signature on edge (??,??) ( i , k ) by combining the signatures on edges (??,??) ( i , j ) and (??,??) ( j , k ) , but it suffers from signature theft and signature abuse. The existing work has... ver más
Revista: Information

 
Ahmed A. Abdullah, B. M. El-den, Khaled M. Abo-Al-Ez and Tarek M. Hassan    
Advanced Metering Infrastructure (AMI) plays a crucial role in enabling the efficient functioning of Smart Electrical Grids, but its successful implementation hinges on robust cybersecurity measures. To uphold data confidentiality and integrity, the depl... ver más
Revista: Applied Sciences

 
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi    
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c... ver más
Revista: Information

 
Bowen He, Han Zheng and Qun Guan    
This study examines the DCMA concerning the future risk of the water security status. We considered three risk factors: population growth, economic growth, and natural water supply?demand differences. In the risk analysis part, we consulted with experts ... ver más
Revista: Water

 
Rui-Hua Liu and Quan Zhou    
With the increasing requirements for the security of medical data, military data, and other data transmission, data hiding technology has gradually developed from only protecting the security of secret data to all transmission data. As a necessary techni... ver más
Revista: Applied Sciences