|
|
|
Nikos Fotiou, Vasilios A. Siris, George Xylomenos and George C. Polyzos
Many IoT use cases can benefit from group communication, where a user requests an IoT resource and this request can be handled by multiple IoT devices, each of which may respond back to the user. IoT group communication involves one-to-many requests and ...
ver más
|
|
|
|
|
|
|
Zhijun Wu, Yun Zhang and Enzhong Xu
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Dat...
ver más
|
|
|
|
|
|
|
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono
Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang, Taizong Gu, Zhi Geng and Guoping Liu
With the advent of the big data era, cloud data storage and retrieval have become popular for efficient data management in large companies and organizations, thus they can enjoy the on-demand high-quality cloud storage service. Meanwhile, for security re...
ver más
|
|
|
|
|
|
|
Ali A. Yassin, Jian Yao and Shiyao Han
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu?Zhu?Feng scheme and indicate many shortcomi...
ver más
|
|
|
|