|
|
|
Renee Carnley and Sikha Bagui
The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digital ...
ver más
|
|
|
|
|
|
|
Fabian Honecker, Julian Dreyer and Ralf Tönjes
Modern Public Key Infrastructures (PKIs) allow users to create and maintain centrally stored cryptographic certificates. These infrastructures use a so-called certificate chain. At the root of the chain, a root Certification Authority (CA) is responsible...
ver más
|
|
|
|
|
|
|
Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is ...
ver más
|
|
|
|
|
|
|
Serhii Yevseiev,Olena Rayevnyeva,Volodymir Ponomarenko,Oleksandr Milov
Pág. 6 - 28
Innovative activity of universities and the formation of entrepreneur universities of the innovative type is one of the forms of integration of the higher education systems of countries into the world educational and scientific space, support of their co...
ver más
|
|
|
|
|
|
|
Fuxiao Zhou, Yanping Li and Yong Ding
Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure communicat...
ver más
|
|
|
|
|
|
|
Adeel Abro, Zhongliang Deng and Kamran Ali Memon
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational an...
ver más
|
|
|
|
|
|
|
Ghizlane MOUKHLISS,Olaf MALASSE,RedaFilali Hilali,Hicham Belhadaoui
Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the m...
ver más
|
|
|
|
|
|
|
Danielle Wilde and Jenny Underwood
New materials with new capabilities demand new ways of approaching design. Destabilising existing methods is crucial to develop new methods. Yet, radical destabilisation?where outcomes remain unknown long enough that new discoveries become possible?is no...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Usama Salama, Lina Yao and Hye-young Paik
The presence of the Internet of Things (IoT) in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient?s status....
ver más
|
|
|
|