Ara
Toplam kayıt 45, listelenen: 31-40
Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020)
The standardization activities of the fifth generation communications are clearly over
and deployment has commenced globally. To sustain the competitive edge of wireless networks,
industrial and academia synergy have ...
A secure and improved multi server authentication protocol using fuzzy commitment
(SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021)
The advancement in communication and computation technologies has paved a way for
connecting large number of heterogeneous devices to offer specified services. Still, the
advantages of this advancement are not realized ...
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet of Things (IoT). E-healthcare is considered the essential service for crowd-sourcing
IoT applications that ...
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022)
With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major
vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between ...
A low-cost privacy preserving user access in mobile edge computing framework
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
The computational offloading from conventional cloud datacenter towards edge devices sprouted
a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in ...
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)
Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities
across the scope of wireless network. In MEC environment, MEC servers along with the computing and
storage capabilities ...
Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
IoT emergence has given rise to a new digital experience of payment transactions where physical objects like refrigerators, cars,
and wearables will make payments. These physical objects will be storing the cardholder ...
An Improved Authentication Scheme for Digital Rights Management System
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
With the increasing number and popularity of digital content, the management of digital access rights has become an utmost
important field. Through digital rights management systems (DRM-S), access to digital contents can ...
SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the ...
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The Internet of Things (IoT) connects enormous objects through various sensors to facilitate daily life by interconnecting the information space with the decision-makers. Security and
privacy are, however, the main concerns ...