16   Artículos

 
en línea
Georgios M. Nikolopoulos and Marc Fischlin    
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule and Cosmas Ifeanyi Nwakanma    
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh    
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Xiang Chen, Shouzhi Xu, Kai Ma and Peng Chen    
A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of a co... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ruohao Zhang, Jean-Philippe Condomines and Emmanuel Lochin    
The rapid development of Internet of Things (IoT) technology, together with mobile network technology, has created a never-before-seen world of interconnection, evoking research on how to make it vaster, faster, and safer. To support the ongoing fight ag... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao and Yong-Yuan Deng    
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Thing... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Abdullah Al Hayajneh, Md Zakirul Alam Bhuiyan and Ian McAndrew    
There has been an increase in the usage of Internet of Things (IoT), which has recently become a rising area of interest as it is being extensively used for numerous applications and devices such as wireless sensors, medical devices, sensitive home senso... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Adeel Abro, Zhongliang Deng and Kamran Ali Memon    
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational an... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zakariae Belghazi, Nabil Benamar, Adnane Addaim and Chaker Abdelaziz Kerrache    
With the rapid growth of Internet of Things (IoT) devices around the world, thousands of mobile users share many data with each other daily. IoT communication has been developed in the past few years to ensure direct connection among mobile users. Howeve... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Smruti Chourasia,Hrishikesh Bharadwaj Chakrapani,Queenie Das,Krati Agarwal,Lavanya K    
The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized k... ver más

« Anterior     Página: 1 de 1     Siguiente »