Ara
Toplam kayıt 49, listelenen: 31-40
Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020)
The standardization activities of the fifth generation communications are clearly over
and deployment has commenced globally. To sustain the competitive edge of wireless networks,
industrial and academia synergy have ...
A secure and improved multi server authentication protocol using fuzzy commitment
(SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021)
The advancement in communication and computation technologies has paved a way for
connecting large number of heterogeneous devices to offer specified services. Still, the
advantages of this advancement are not realized ...
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet of Things (IoT). E-healthcare is considered the essential service for crowd-sourcing
IoT applications that ...
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022)
With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major
vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between ...
A low-cost privacy preserving user access in mobile edge computing framework
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
The computational offloading from conventional cloud datacenter towards edge devices sprouted
a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in ...
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)
Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities
across the scope of wireless network. In MEC environment, MEC servers along with the computing and
storage capabilities ...
Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
IoT emergence has given rise to a new digital experience of payment transactions where physical objects like refrigerators, cars,
and wearables will make payments. These physical objects will be storing the cardholder ...
An Improved Authentication Scheme for Digital Rights Management System
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
With the increasing number and popularity of digital content, the management of digital access rights has become an utmost
important field. Through digital rights management systems (DRM-S), access to digital contents can ...
Security, Trust and Privacy for Cloud, Fog and Internet of Things
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
Internet of !ings (IoT) is a promising networking scenario
in the cyber world, bridging physical devices and virtual
objects. By considering the limited capacity of smart things,
cloud computing is generally applied to ...
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
There is a rising need to secure data in the era of big data. But with the rapid development of technologies such as IoT and cloud
computing, users’ security and privacy measures are under tremendous pressure. Big data ...