Zobrazeno 1 - 10
of 16
pro vyhledávání: '"nur nabila mohamed"'
Autor:
Fazlina Mohd Ali, Nur Arzilawati Md Yunus, Nur Nabila Mohamed, Marizuana Mat Daud, Elankovan A. Sundararajan
Publikováno v:
Symmetry, Vol 15, Iss 11, p 1964 (2023)
The Internet of Everything (IoE) represents a paradigm shift in the world of connectivity. While the Internet of Things (IoT) initiated the era of interconnected devices, the IoE takes this concept to new heights by interlinking objects, individuals,
Externí odkaz:
https://doaj.org/article/249c95aa2b0c4aba996af13a9364fff8
Publikováno v:
Journal of ICT, Vol 19, Iss 3, Pp 279-319 (2020)
Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein comp
Externí odkaz:
https://doaj.org/article/f457f68142834d15952a733179dc096f
Publikováno v:
Journal of ICT, Vol 19, Iss 3 (2020)
Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein comp
Externí odkaz:
https://doaj.org/article/2d5b1d8925ab4e4db6bf2ec848a75926
Publikováno v:
Journal of ICT, Vol 19, Iss 3, Pp 279-319 (2020)
Cryptography is described as the study of encrypting or secret Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in
Publikováno v:
2020 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS).
Providing a security system for any electrical equipment has become a vital interest in which the latest technologies are being adopted to serve this purpose. University classrooms usually implement automatic door lock attached with a sensor to enabl
Publikováno v:
Telecommunication Systems. 70:511-523
Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transf
Publikováno v:
Journal of Engineering Science and Technology, Vol 12, Iss 1, Pp 098-112 (2017)
Scopus-Elsevier
Scopus-Elsevier
Advances in the communication technology of embedded systems have led to the situation where nowadays almost all systems should implement security for data safety. Trivial File Transfer Protocol (TFTP) has advantages for use in embedded systems due t
Publikováno v:
2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).
Location Based Services (LBS) are any services or software applications that require the geographic location (longitude and latitude) of an entity. Nowadays, with the aid of smartphones, LBSs have improved tremendously in the market with wide range o
Publikováno v:
International Journal of Engineering & Technology. 7:257
Radio Frequency (RF) communication plays a vital role for sensor node data transmission, which typically runs on top of lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic
Publikováno v:
International Journal of Engineering & Technology. 7:262
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In