Zobrazeno 1 - 10
of 112
pro vyhledávání: '"Ming-Hour Yang"'
Publikováno v:
IEEE Access, Vol 10, Pp 123634-123650 (2022)
Frontend supply chains involve the transfer of large quantities of products. Therefore, incomplete transfer and product loss are inevitable. This paper presents a high-efficiency group ownership transfer protocol that incorporates blockchains to enab
Externí odkaz:
https://doaj.org/article/c8b666db12be4c3e857acc94c7215f4e
Autor:
Vankamamidi Srinivasa Naresh, Sivaranjani Reddi, Saru Kumari, V. V. L. Divakar Allavarpu, Sachin Kumar, Ming-Hour Yang
Publikováno v:
IEEE Access, Vol 9, Pp 21267-21278 (2021)
Contemporary developments in providing proper security in the Internet of Things (IoT) have been made signcryption scheme highly suitable for various applications such as smart cities, smart healthcare and smart agriculture. However, security and pri
Externí odkaz:
https://doaj.org/article/f3ac72b1415e4a20816716db6b8985d7
Autor:
Shafiq Ahmed, Saru Kumari, Muhammad Asad Saleem, Kadambri Agarwal, Khalid Mahmood, Ming-Hour Yang
Publikováno v:
IEEE Access, Vol 8, Pp 119829-119839 (2020)
The blend of Internet of Things (IoT) and social networking has introduced the emerging notion of social Internet of Things, which is bringing advancements in the operation of concerned industries. There are various prevailing applications of social
Externí odkaz:
https://doaj.org/article/d457576427364f778a1f33bdff7c4bb4
Publikováno v:
IEEE Access, Vol 8, Pp 201087-201097 (2020)
With the advent of the Internet of Things (IoT), there are also major information security risks hidden behind them. There are major information security risks hidden behind them. Attackers can conceal their actual attack locations by spoofing IP add
Externí odkaz:
https://doaj.org/article/90f8512c3b154c238baa3e1ae1663158
Publikováno v:
IEEE Access, Vol 8, Pp 139244-139254 (2020)
Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT). The access control mechanism can ensure the reliability through secure c
Externí odkaz:
https://doaj.org/article/e8d67ca71b3f4c08b26b97290a2600ac
Publikováno v:
Sensors, Vol 22, Iss 22, p 8793 (2022)
A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user’s information, secure session key, associated authentication, and use
Externí odkaz:
https://doaj.org/article/03c8d5fe64e34f768bca538ef5ced3f5
Publikováno v:
Mathematical Biosciences and Engineering, Vol 16, Iss 6, Pp 6562-6586 (2019)
In the IoT environment, many terminal devices are deployed in unattended areas. If these devices are moved elsewhere by an attacker, the wrong environmental sensing values are obtained, which causes a major disaster. In this paper, we propose an ambi
Externí odkaz:
https://doaj.org/article/a6709629b9b14c0c8bb6d47b08a21063
Publikováno v:
Sensors, Vol 22, Iss 5, p 1989 (2022)
In recent years, improvements to the computational ability of mobile phones and support for near-field-communication have enabled transactions to be performed by using mobile phones to emulate a credit card or by using quick response codes. Thus, use
Externí odkaz:
https://doaj.org/article/449b8001162b4f9ca719da7d82b28dac
Publikováno v:
Sensors, Vol 21, Iss 21, p 7069 (2021)
The design of the Controller Area Network (CAN bus) did not account for security issues and, consequently, attacks often use external mobile communication interfaces to conduct eavesdropping, replay, spoofing, and denial-of-service attacks on a CAN b
Externí odkaz:
https://doaj.org/article/7e600f105ae84647821b67ffce28ef78
Autor:
Jia-Ning Luo, Ming-Hour Yang
Publikováno v:
Sensors, Vol 19, Iss 21, p 4611 (2019)
In 2014, Yang proposed a method to enhance the current EMV credit card protocol (EPMAR). However, the protocol ignores the exceeding of a credit quota caused by multiple offline transactions, with the result that the amount spent can exceed the risk
Externí odkaz:
https://doaj.org/article/5599e6ff70a74e43ae9ac884658f10fd