140   Artículos

 
en línea
Jiaxing Wu, Nian Xue, Zhen Li, Xianbin Hong, Yilin Zhao, Xin Huang and Jie Zhang    
The access control system is a critical element in intelligent buildings. In this paper, we present SPCL, an innovative access control system designed to facilitate building entry through the use of mobile phones. Our system aims to provide a secure and ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Messaoud Benguenane, Ahmed Korichi, Bouziane Brik and Nadjet Azzaoui    
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mira Lee and Minhye Seo    
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Firas Najjar, Qusay Bsoul and Hasan Al-Refai    
Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on t... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ivan Nedyalkov    
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Hendrik Ballhausen and Ludwig Christian Hinske    
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulat... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Seyed Mohammad Hashemi, Ruxandra Mihaela Botez and Georges Ghazi    
This paper introduces an innovative consensus algorithm for managing Unmanned Aircraft System Traffic (UTM) through blockchain technology, a highly secure consensus protocol, to allocate airspace. A smart contract was developed on the Ethereum blockchain... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Naythan Villafuerte, Santiago Manzano, Paulina Ayala and Marcelo V. García    
Due to the similarities in symptomatology between COVID-19 and other respiratory infections, diagnosis of these diseases can be complicated. To address this issue, a web application was developed that employs a chatbot and artificial intelligence to dete... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nuwan Weerasinghe, Muhammad Arslan Usman, Chaminda Hewage, Eckhard Pfluegel and Christos Politis    
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, secur... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 9     Siguiente »