Zobrazeno 1 - 10
of 279
pro vyhledávání: '"Eun-Jun Yoon"'
Publikováno v:
IEEE Access, Vol 5, Pp 3622-3639 (2017)
Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Several authors have put forward various authentic
Externí odkaz:
https://doaj.org/article/6dde947b8b864cbcbd904fa79101b8ba
Autor:
Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Alavalapati Goutham Reddy, Eun-Jun Yoon, Kee-Young Yoo
Publikováno v:
IEEE Access, Vol 5, Pp 3028-3043 (2017)
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with
Externí odkaz:
https://doaj.org/article/8d6eb158d18c4b29a0aa682a1dac6f1b
Publikováno v:
IEEE Access, Vol 4, Pp 4394-4407 (2016)
Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentic
Externí odkaz:
https://doaj.org/article/f1d2e0fe785642d89c31ebc40e12e708
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2011 (2011)
Externí odkaz:
https://doaj.org/article/e2236322c2104abe94490d273181ff70
Publikováno v:
Data Mining and Knowledge Discovery in Real Life Applications
Information systems in the modern process and manufacturing sector bridge several layers, from the boardroom to the shop floor. At one end of this spectrum the ubiquitous ERP systems exist that have become essential to today's IT-enabled enterprises.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2bbf55d0d4d611de670b6b0a3fac5325
http://www.intechopen.com/articles/show/title/automatic_product_classification_control_system_using_rfid_tag_information_and_data_mining
http://www.intechopen.com/articles/show/title/automatic_product_classification_control_system_using_rfid_tag_information_and_data_mining
Publikováno v:
Concurrency and Computation: Practice and Experience. 33
Publikováno v:
Journal of Computers. :194-203
Publikováno v:
Journal of Information Security. :75-90
The digitization of patient health information has brought many benefits and challenges for both the patients and physicians. However, security and privacy preservation have remained important challenges for remote health monitoring systems. Since a
Publikováno v:
IEEE Access, Vol 5, Pp 3622-3639 (2017)
Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Several authors have put forward various authentic
Publikováno v:
Security and Communication Networks, Vol 2019 (2019)
Data hiding is a technique that hides the existence of secret data from malicious attackers. In this paper, we propose a new data-hiding scheme using multidirectional pixel-value differencing, which can embed secret data in two directions or three di