Zobrazeno 1 - 10
of 326
pro vyhledávání: '"authentication and key agreement"'
Publikováno v:
Tongxin xuebao, Vol 45, Pp 101-116 (2024)
To address the shortcomings of existing authentication schemes in vehicle networks, which commonly suffer from key escrow issues, as well as the lack of consideration for lightweight deployment and secure rapid authentication of compute-constrained e
Externí odkaz:
https://doaj.org/article/f6d05fbeb9cc464eb12ca6d7fa815969
Publikováno v:
Journal of Communications Software and Systems, Vol 20, Iss 2, Pp 186-197 (2024)
Recently, the numerous academic papers have been published on Authentication and Key Agreement (AKA) schemes for securing wireless sensor networks (WSN) in the context of the Internet of Things (IoT). The goal of these schemes is to protect external
Externí odkaz:
https://doaj.org/article/ec13cd2487504e0b96200d9e61dc72cd
Publikováno v:
Energies, Vol 17, Iss 18, p 4550 (2024)
The smart grid (SG) is an efficient and reliable framework capable of controlling computers, automation, new technologies, and devices. Advanced metering infrastructure (AMI) is a crucial part of the SG, facilitating two-way communication between use
Externí odkaz:
https://doaj.org/article/e3d07d32894e4a49993342444a6dafaa
On the design of an AI-driven secure communication scheme for internet of medical things environment
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 5, Pp 1080-1089 (2023)
The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, that facilitate the connection of healthcare information technology system via the Internet. It is also cal
Externí odkaz:
https://doaj.org/article/2b6c7313b2c14fa0ab65c350c5463ef6
SLAKA-IoD: A Secure and Lightweight Authentication and Key Agreement Protocol for Internet of Drones
Autor:
Yuelei Xiao, Yu Tao
Publikováno v:
Drones, Vol 8, Iss 8, p 374 (2024)
The existing authentication and key agreement (AKA) schemes for the internet of drones (IoD) still suffer from various security attacks and fail to ensure required security properties. Moreover, drones generally have limited memory and computation ca
Externí odkaz:
https://doaj.org/article/dbcddbd5eef34bb89c6d9492990b02b0
Publikováno v:
Applied Sciences, Vol 14, Iss 8, p 3187 (2024)
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, mak
Externí odkaz:
https://doaj.org/article/a829230c532f43b4bee3a9ffddb20124
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 10, Pp 75365-75375 (2022)
Digital twin technology is recently in the spotlight because of its potential applicability in business and industry. In digital twin environments, data generated from physical assets are transmitted to a remote server, which performs simulations thr
Externí odkaz:
https://doaj.org/article/b35f13cb167d4d7fb122a6e18c0807f9
Autor:
Ya-Chu Cheng, Chung-An Shen
Publikováno v:
IEEE Access, Vol 10, Pp 77679-77687 (2022)
The security architecture and procedure for 5G systems (TS 33.501) is based on the 3rd Generation Partner Project (3GPP) security specification draft that is released in 2018. Since its debut, the security violations in the 5G security protocol have
Externí odkaz:
https://doaj.org/article/cf589902547848dd848dd6732488d0bd