Ara
Toplam kayıt 55, listelenen: 41-50
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)
Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities
across the scope of wireless network. In MEC environment, MEC servers along with the computing and
storage capabilities ...
Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
IoT emergence has given rise to a new digital experience of payment transactions where physical objects like refrigerators, cars,
and wearables will make payments. These physical objects will be storing the cardholder ...
An Improved Authentication Scheme for Digital Rights Management System
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
With the increasing number and popularity of digital content, the management of digital access rights has become an utmost
important field. Through digital rights management systems (DRM-S), access to digital contents can ...
Security, Trust and Privacy for Cloud, Fog and Internet of Things
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
Internet of !ings (IoT) is a promising networking scenario
in the cyber world, bridging physical devices and virtual
objects. By considering the limited capacity of smart things,
cloud computing is generally applied to ...
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
There is a rising need to secure data in the era of big data. But with the rapid development of technologies such as IoT and cloud
computing, users’ security and privacy measures are under tremendous pressure. Big data ...
SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the ...
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The Internet of Things (IoT) connects enormous objects through various sensors to facilitate daily life by interconnecting the information space with the decision-makers. Security and
privacy are, however, the main concerns ...
A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
Recently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has
gained attention as marine operations have increased substantially. Using modern information network technologies ...
Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
Vehicle-to-everything (V2X) communications have recently
gained concentration of researchers for both, academia as
well as industry. In the V2X system, the information is
communicated from vehicle sensors to other ...
An enhanced scheme for mutual authentication for healthcare services
(KEAI PUBLISHING LTD, 16 DONGHUANGCHENGGEN NORTH ST, BEIJING, DONGCHENG DISTRICT 100717, PEOPLES R CHINA, 2022)
With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and
convenient healthcare services to patients at their doorsteps. However, this architecture engenders new ...