Zobrazeno 1 - 10
of 5 918
pro vyhledávání: '"mutual authentication"'
Publikováno v:
International Journal of Pervasive Computing and Communications, 2022, Vol. 20, Issue 4, pp. 398-414.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJPCC-06-2021-0144
Autor:
Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Rupak Kharel, Ashok Kumar Das, Sachin Shetty, Joel J.P.C. Rodrigues
Publikováno v:
Journal of Advanced Research, Vol 62, Iss , Pp 155-163 (2024)
Introduction:: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical and digital domains is crucial
Externí odkaz:
https://doaj.org/article/3235ab1404b948e2b98899bced1e1ad0
Publikováno v:
Invotek: Jurnal Inovasi Vokasional dan Teknologi, Vol 24, Iss 1, Pp 9-18 (2024)
The rapid development of the IoT (Internet of Things) demands speed and security of communication between connected entities via the Internet. A suitable communication protocol for this communication in terms of speed optimization is MQTT (Message Qu
Externí odkaz:
https://doaj.org/article/1d3977150dc54d1ca87d968382ad1a1f
Publikováno v:
Journal of Communications Software and Systems, Vol 20, Iss 2, Pp 186-197 (2024)
Recently, the numerous academic papers have been published on Authentication and Key Agreement (AKA) schemes for securing wireless sensor networks (WSN) in the context of the Internet of Things (IoT). The goal of these schemes is to protect external
Externí odkaz:
https://doaj.org/article/ec13cd2487504e0b96200d9e61dc72cd
Publikováno v:
Journal of Information and Telecommunication, Vol 8, Iss 2, Pp 231-261 (2024)
ABSTRACTElliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents the ideal choice for implementing public-key cryptography in resource-limited devices, such as those found in envisioned Internet of Things applications, e.g. wirele
Externí odkaz:
https://doaj.org/article/f2c89d9d88064d9590a44b89003d8ca1
Publikováno v:
IEEE Access, Vol 12, Pp 50925-50934 (2024)
The most recent ultra-lightweight mutual authentication protocol (UMAP) adopts a mechanism for key updating to keep the security forward and backward. The back-end server updates the secret keys immediately after sending the final message. Certainly,
Externí odkaz:
https://doaj.org/article/f2c78116cfea4e87ab06cbd7ab90799d
Autor:
Kongze Li
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-11 (2024)
Abstract The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems. Therefore, how to solve network security problems is the main research direction of current netw
Externí odkaz:
https://doaj.org/article/db5e99082550402485fdd933366b4925
Autor:
Xinzhong Su, Youyun Xu
Publikováno v:
Sensors, Vol 24, Iss 22, p 7119 (2024)
Authentication is considered one of the most critical technologies for the next generation of the Internet of Medical Things (IoMT) due to its ability to significantly improve the security of sensors. However, higher frequency cyber-attacks and more
Externí odkaz:
https://doaj.org/article/6f51d13e28aa4c1e91080250ff48c909
Publikováno v:
Applied Sciences, Vol 14, Iss 20, p 9402 (2024)
Nowadays, mobile–mobile interaction is becoming a fundamental methodology for human–human networking services since mobile devices are the most common interfacing equipment for recent smart services such as food delivery, e-commerce, ride-hailing
Externí odkaz:
https://doaj.org/article/28899432c77d42b2b3bb4ab29222c3dd
Autor:
Ali Peivandizadeh, Haitham Y. Adarbah, Behzad Molavi, Amirhossein Mohajerzadeh, Ali H. Al-Badi
Publikováno v:
Future Internet, Vol 16, Iss 10, p 357 (2024)
In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technology era.
Externí odkaz:
https://doaj.org/article/d9f70f360dae46a3907945e71d284b00