37   Artículos

 
en línea
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab    
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwardi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Ricardo Severino, José Simão, Nuno Datia and António Serrador    
Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attacker... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Michael Xevgenis, Dimitrios G. Kogias, Panagiotis A. Karkazis and Helen C. Leligou    
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Saad Inshi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi    
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today?s i... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu    
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh    
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information    Formato: Electrónico

 
en línea
Messaoud Benguenane, Ahmed Korichi, Bouziane Brik and Nadjet Azzaoui    
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muntadher Sallal, Ruairí de Fréin and Ali Malik    
Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the corresponding ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »