|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Oluwashina Joseph Ajayi, Joseph Rafferty, Jose Santos, Matias Garcia-Constantino and Zhan Cui
The scale of Internet of Things (IoT) systems has expanded in recent times and, in tandem with this, IoT solutions have developed symbiotic relationships with technologies, such as edge Computing. IoT has leveraged edge computing capabilities to improve ...
ver más
|
|
|
|
|
|
|
Benjamin Leiding, Priyanka Sharma and Alexander Norta
Nowadays, business enactments almost exclusively focus on human-to-human business transactions. However, the ubiquitousness of smart devices enables business enactments among autonomously acting machines, thereby providing the foundation for the machine-...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA...
ver más
|
|
|
|
|
|
|
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao and Yong-Yuan Deng
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Thing...
ver más
|
|
|
|
|
|
|
Tsung-Hung Lin and Ming-Te Chen
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampere...
ver más
|
|
|
|
|
|
|
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ...
ver más
|
|
|
|
|
|
|
Fuxiao Zhou, Yanping Li and Yong Ding
Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure communicat...
ver más
|
|
|
|
|
|
|
Osman Ghazali,Chun Yang Leow,Shahzad Qaiser,Nanthini Pattabiraman,Sathiyaroobaa Vasuthevan,Eman Mohamed Abdusalam,Mustafa M. Barakat
Pág. pp. 96 - 116
Customer disposition to data, nature of the information on site, protection concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-comme...
ver más
|
|
|
|
|
|
|
Neelambike S,Parashuram Baraki
In Vehicular Ad Hoc Networks (VANET), vehicles communicate with another vehicle and also communicate with infrastructure (RSU) points by broadcasting safety and non-safety messages in the network by using the DSRC. In wireless communication, security and...
ver más
|
|
|
|