19   Artículos

 
en línea
Renee Carnley and Sikha Bagui    
The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digital ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fabian Honecker, Julian Dreyer and Ralf Tönjes    
Modern Public Key Infrastructures (PKIs) allow users to create and maintain centrally stored cryptographic certificates. These infrastructures use a so-called certificate chain. At the root of the chain, a root Certification Authority (CA) is responsible... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck    
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Serhii Yevseiev,Olena Rayevnyeva,Volodymir Ponomarenko,Oleksandr Milov     Pág. 6 - 28
Innovative activity of universities and the formation of entrepreneur universities of the innovative type is one of the forms of integration of the higher education systems of countries into the world educational and scientific space, support of their co... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Fuxiao Zhou, Yanping Li and Yong Ding    
Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure communicat... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Adeel Abro, Zhongliang Deng and Kamran Ali Memon    
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational an... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ghizlane MOUKHLISS,Olaf MALASSE,RedaFilali Hilali,Hicham Belhadaoui    
Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the m... ver más

 
en línea
Danielle Wilde and Jenny Underwood    
New materials with new capabilities demand new ways of approaching design. Destabilising existing methods is crucial to develop new methods. Yet, radical destabilisation?where outcomes remain unknown long enough that new discoveries become possible?is no... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei    
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Usama Salama, Lina Yao and Hye-young Paik    
The presence of the Internet of Things (IoT) in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient?s status.... ver más
Revista: Informatics    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »