Zobrazeno 1 - 10
of 5 897
pro vyhledávání: '"mutual authentication"'
Autor:
Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Rupak Kharel, Ashok Kumar Das, Sachin Shetty, Joel J.P.C. Rodrigues
Publikováno v:
Journal of Advanced Research, Vol 62, Iss , Pp 155-163 (2024)
Introduction:: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical and digital domains is crucial
Externí odkaz:
https://doaj.org/article/3235ab1404b948e2b98899bced1e1ad0
Publikováno v:
Invotek: Jurnal Inovasi Vokasional dan Teknologi, Vol 24, Iss 1, Pp 9-18 (2024)
The rapid development of the IoT (Internet of Things) demands speed and security of communication between connected entities via the Internet. A suitable communication protocol for this communication in terms of speed optimization is MQTT (Message Qu
Externí odkaz:
https://doaj.org/article/1d3977150dc54d1ca87d968382ad1a1f
Publikováno v:
Journal of Communications Software and Systems, Vol 20, Iss 2, Pp 186-197 (2024)
Recently, the numerous academic papers have been published on Authentication and Key Agreement (AKA) schemes for securing wireless sensor networks (WSN) in the context of the Internet of Things (IoT). The goal of these schemes is to protect external
Externí odkaz:
https://doaj.org/article/ec13cd2487504e0b96200d9e61dc72cd
Publikováno v:
Journal of Information and Telecommunication, Vol 8, Iss 2, Pp 231-261 (2024)
ABSTRACTElliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents the ideal choice for implementing public-key cryptography in resource-limited devices, such as those found in envisioned Internet of Things applications, e.g. wirele
Externí odkaz:
https://doaj.org/article/f2c89d9d88064d9590a44b89003d8ca1
Publikováno v:
IEEE Access, Vol 12, Pp 50925-50934 (2024)
The most recent ultra-lightweight mutual authentication protocol (UMAP) adopts a mechanism for key updating to keep the security forward and backward. The back-end server updates the secret keys immediately after sending the final message. Certainly,
Externí odkaz:
https://doaj.org/article/f2c78116cfea4e87ab06cbd7ab90799d
Autor:
Kongze Li
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-11 (2024)
Abstract The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems. Therefore, how to solve network security problems is the main research direction of current netw
Externí odkaz:
https://doaj.org/article/db5e99082550402485fdd933366b4925
Publikováno v:
Applied Sciences, Vol 14, Iss 20, p 9402 (2024)
Nowadays, mobile–mobile interaction is becoming a fundamental methodology for human–human networking services since mobile devices are the most common interfacing equipment for recent smart services such as food delivery, e-commerce, ride-hailing
Externí odkaz:
https://doaj.org/article/28899432c77d42b2b3bb4ab29222c3dd
Autor:
Ali Peivandizadeh, Haitham Y. Adarbah, Behzad Molavi, Amirhossein Mohajerzadeh, Ali H. Al-Badi
Publikováno v:
Future Internet, Vol 16, Iss 10, p 357 (2024)
In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technology era.
Externí odkaz:
https://doaj.org/article/d9f70f360dae46a3907945e71d284b00
Publikováno v:
Sensors, Vol 24, Iss 16, p 5376 (2024)
Vehicle Ad-hoc Networks (VANETs) have experienced significant development in recent years, playing a crucial role in enhancing the driving experience by enabling safer and more efficient inter-vehicle interactions through information exchange. Vehicl
Externí odkaz:
https://doaj.org/article/1bff14614475436aabda5c7f14349db9
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-13 (2023)
Abstract The rapid growth of Internet users was the motivation of the emerge appearance of new computing models such as cloud computing, fog computing and edge computing. For this reason, the multi-server’s architecture has been introduced to exten
Externí odkaz:
https://doaj.org/article/7c5e6a83d56540e9b8884bbfca830294