Ara
Toplam kayıt 4, listelenen: 1-4
A clogging resistant secure authentication scheme for fog computing services
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)
Fog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such
as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits ...
A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ, 2022)
The rising popularity of ICT and the Internet has
enabled Unmanned Aerial Vehicle (UAV) to offer advantageous
assistance to Vehicular Ad-hoc Network (VANET), realizing a
relay node’s role among the disconnected segments ...
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)
Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities
across the scope of wireless network. In MEC environment, MEC servers along with the computing and
storage capabilities ...
An enhanced scheme for mutual authentication for healthcare services
(KEAI PUBLISHING LTD, 16 DONGHUANGCHENGGEN NORTH ST, BEIJING, DONGCHENG DISTRICT 100717, PEOPLES R CHINA, 2022)
With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and
convenient healthcare services to patients at their doorsteps. However, this architecture engenders new ...