Ara
Toplam kayıt 19, listelenen: 1-10
Designing secure and lightweight user access to drone for smart city surveillance
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)
The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life
comfort through various functions including the smart city surveillance. The IoD can enhance the ...
A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ, 2022)
The rising popularity of ICT and the Internet has
enabled Unmanned Aerial Vehicle (UAV) to offer advantageous
assistance to Vehicular Ad-hoc Network (VANET), realizing a
relay node’s role among the disconnected segments ...
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet of Things (IoT). E-healthcare is considered the essential service for crowd-sourcing
IoT applications that ...
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022)
With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major
vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between ...
A low-cost privacy preserving user access in mobile edge computing framework
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
The computational offloading from conventional cloud datacenter towards edge devices sprouted
a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in ...
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)
Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities
across the scope of wireless network. In MEC environment, MEC servers along with the computing and
storage capabilities ...
Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
IoT emergence has given rise to a new digital experience of payment transactions where physical objects like refrigerators, cars,
and wearables will make payments. These physical objects will be storing the cardholder ...
An Improved Authentication Scheme for Digital Rights Management System
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
With the increasing number and popularity of digital content, the management of digital access rights has become an utmost
important field. Through digital rights management systems (DRM-S), access to digital contents can ...
Security, Trust and Privacy for Cloud, Fog and Internet of Things
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
Internet of !ings (IoT) is a promising networking scenario
in the cyber world, bridging physical devices and virtual
objects. By considering the limited capacity of smart things,
cloud computing is generally applied to ...
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
There is a rising need to secure data in the era of big data. But with the rapid development of technologies such as IoT and cloud
computing, users’ security and privacy measures are under tremendous pressure. Big data ...