18   Artículos

 
en línea
Burhan Ul Islam Khan, Khang Wen Goh, Mohammad Shuaib Mir, Nur Fatin Liyana Mohd Rosely, Aabid Ahmad Mir and Mesith Chaimanee    
As the Internet of Things (IoT) continues to revolutionize value-added services, its conventional architecture exhibits persistent scalability and security vulnerabilities, jeopardizing the trustworthiness of IoT-based services. These architectural limit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi    
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang    
The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs) ar... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah    
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor netw... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Qiang Li    
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Agus Winarno and Riri Fitri Sari    
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango and Antonio Francesco Gentile    
Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in their... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jin-Bo Wang, You Wu and Yu Zhou    
Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. The diffusion layer of the Advanced Encryption Standard (AES) uses the circulant MDS matrix with ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Malik Qasaimeh, Raad S. Al-Qassas and Mohammad Ababneh    
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications. Encr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rameez Asif    
The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems almost ... ver más
Revista: IoT    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »