Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Information security protocols"'
Autor:
Khaled Shuaib, Ezedin Barka, Juhar Ahmed Abdella, Farag Sallabi, Mohammed Abdel-Hafez, Ala Al-Fuqaha
Publikováno v:
Energies, Vol 10, Iss 7, p 1024 (2017)
Charging of plug-in electric vehicles (PEVs) exposes smart grid systems and their users to different kinds of security and privacy attacks. Hence, a secure charging protocol is required for PEV charging. Existing PEV charging protocols are usually ba
Externí odkaz:
https://doaj.org/article/211a4e89c10d4c85b7f23ceb140ef390
To start with, personal medical data is private and strictly protected. However, progress cannot be made in medicine without human data. The solution is a data management software program that provides security and only grants access to authorised ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7daaa5c0e0a4e9d5028c2ef5523aab2c
Autor:
Mohammed Abdel-Hafez, Khaled Shuaib, Ala Al-Fuqaha, Ezedin Barka, Juhar Ahmed Abdella, Farag Sallabi
Publikováno v:
Energies; Volume 10; Issue 7; Pages: 1024
Energies, Vol 10, Iss 7, p 1024 (2017)
Energies, Vol 10, Iss 7, p 1024 (2017)
Charging of plug-in electric vehicles (PEVs) exposes smart grid systems and their users to different kinds of security and privacy attacks. Hence, a secure charging protocol is required for PEV charging. Existing PEV charging protocols are usually ba
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.