8   Artículos

 
en línea
Tony Gwyn, Kaushik Roy and Mustafa Atay    
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Seonghyeon Gong, Abir EL Azzaoui, Jeonghun Cha and Jong Hyuk Park    
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices. This architecture ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mauro Leonardi and Fabrizio Gerardi    
Nowadays, aircraft safety is based on different systems and four of them share the same data-link protocol: Secondary Surveillance Radar, Automatic Dependent Surveillance System, Traffic Collision Avoidance System, and Traffic Information System use the ... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Revista: Sustainability    Formato: Electrónico

 
en línea
Spyridon Arvanitis     Pág. 94 - 98
Peer-to-peer (P2P) lending allows primarily unsecured personal loans to be made between any two or more parties rather than requesting a loan strictly through a financial institution. In a decentralized P2P lending system, using digital blockchain techno... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »