10   Artículos

 
en línea
Nikos Fotiou, Vasilios A. Siris, George Xylomenos and George C. Polyzos    
Many IoT use cases can benefit from group communication, where a user requests an IoT resource and this request can be handled by multiple IoT devices, each of which may respond back to the user. IoT group communication involves one-to-many requests and ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhijun Wu, Yun Zhang and Enzhong Xu    
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Dat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono     Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei    
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang, Taizong Gu, Zhi Geng and Guoping Liu    
With the advent of the big data era, cloud data storage and retrieval have become popular for efficient data management in large companies and organizations, thus they can enjoy the on-demand high-quality cloud storage service. Meanwhile, for security re... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ali A. Yassin, Jian Yao and Shiyao Han    
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu?Zhu?Feng scheme and indicate many shortcomi... ver más
Revista: Computers    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »