23   Artículos

 
en línea
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan    
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Youcef Fouzar, Ahmed Lakhssassi and Ramakrishna Mundugar    
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content prov... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Manal Rajeh AlShalaan and Suliman Mohamed Fati    
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th... ver más
Revista: Information    Formato: Electrónico

 
en línea
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi    
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xiang Chen, Shouzhi Xu, Kai Ma and Peng Chen    
A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of a co... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nikita Konstantinovich Chistousov, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov and Aleksandr Anatolyevich Olenev    
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Inter... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li    
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Baocheng Wang and Zetao Li    
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the g... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Guma Ali, Mussa Ally Dida and Anael Elikana Sam    
The proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions. It has also increased the security challenges associated with the current two-factor authentication (2FA) scheme for mobile... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Han-Yu Lin    
Nowadays there are many social networking services supporting three-party communication such as Skype, Line, and Facebook Messenger. To ensure the message security, a cryptographic encryption scheme is a commonly adopted measure. However, the traditional... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »