17   Artículos

 
en línea
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan    
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muhammad Asghar Khan, Hosam Alhakami, Insaf Ullah, Wajdi Alhakami, Syed Agha Hassnain Mohsan, Usman Tariq and Nisreen Innab    
Security and privacy issues were long a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computi... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Giriraj Sharma, Amit M. Joshi and Saraju P. Mohanty    
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to var... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yongli Tang, Deng Pan, Panke Qin and Liping Lv    
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Asad Iqbal, Muhammad Zubair, Muhammad Asghar Khan, Insaf Ullah, Ghani Ur-Rehman, Alexey V. Shvetsov and Fazal Noor    
Vehicular ad hoc networks (VANETs) have become an essential part of the intelligent transportation system because they provide secure communication among vehicles, enhance vehicle safety, and improve the driving experience. However, due to the openness a... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tsuyang Wu, Xinglan Guo, Yehcheng Chen, Saru Kumari and Chienming Chen    
At present, the great progress made by the Internet of Things (?????? I o T ) has led to the emergence of the Internet of Drones (?????? I o D ). ?????? I o D is an extension of the ?????? I o T , which is used to control and manipulate drones entering ... ver más
Revista: Drones    Formato: Electrónico

 
en línea
N. P. Varnovsky     Pág. 28 - 32
We consider blockchain as a new cryptographic primitive. This primitive is defined as an ordered database that allows only the following two types of queries: (a) read the data (by any user) and (b) add a new record to theend of the databa... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Han-Yu Lin    
Nowadays there are many social networking services supporting three-party communication such as Skype, Line, and Facebook Messenger. To ensure the message security, a cryptographic encryption scheme is a commonly adopted measure. However, the traditional... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fuxiao Zhou, Yanping Li and Yong Ding    
Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure communicat... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chen Guo, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li and Ting Wu    
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without leakin... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »