A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad
نویسندگان
چکیده
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملZero Footprint Secure Internet Authentication Using Network Smart Card
This paper describes the motivation and technological innovation of Network Smart Card, a next generation smart card architecture that supports standard Internet communication and security protocols. It outlines the role of these next generation smart cards in addressing some of the weaknesses inherent in current Internet authentication frameworks. The paper evaluates several common methods of ...
متن کاملEvolving a Secure Internet
Internet insecurity is inevitable if a high proportion of Internet users are insufficiently aware of the inherent risks involved, whilst those cognizant of those risks are denied the facilities to manage and control them. This paper highlights the first issue and discusses a potential approach to the second.
متن کاملA Study on the Implementation of Secure Smart City
In the 21st century, 'Smart City' and 'Smart Community' have been attracting attention in many cities around the world, in order to utilize limited resources effectively and utilize limited resources as well as establish sustainable cities. However, this smart city debate has not been activated as much as I thought. In this study, we discuss the concept of a smart city and examine cyber securit...
متن کاملA Secure Auction Service
In this paper we describe a distributed “English” auction service that remains correct and reliable despite the malicious corruption of some of the bidders and the auctioneer. We describe the properties of such an auction service, the implementation of the auction service, and how the auction service satis¿es the required properties. The auctioneer is replicated for fault tolerance, and all com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Academia-Industrial cooperation Society
سال: 2013
ISSN: 1975-4701
DOI: 10.5762/kais.2013.14.3.1428