نتایج جستجو برای: avispa
تعداد نتایج: 166 فیلتر نتایج به سال:
In addition to its benefits, the popular Internet of Things (IoT) technology has also opened way novel security and privacy issues. The basis IoT starts with trust in hardware supply chain. Counterfeiting, cloning, tampering hardware, theft, lost issues chain have be addressed, order ensure reliable industry growth. four previous works, radio-frequency identification (RFID)-enabled solutions be...
<p>COVID-19 was first reported in China Wuhan and rapidly grown up to more than 58 countries based on the World Health Organization (WHO). Well ahead of any health emergency, care server has ability access these data via authorization then s/he performs necessary actions. In order protect medical from malicious activities, authentication is starting point for this. Authentication systems ...
Industrial internet of things (IIoT) is the usage (IoT) devices and applications for purpose sensing, processing communicating real-time events in industrial system to reduce unnecessary operational cost enhance manufacturing other industrial-related processes attain more profits. However, such IoT based smart industries need connectivity interoperability which makes them susceptible numerous c...
In this paper, we present a WItness based Data priority mEchanism (WIDE) for vehicles in the vicinity of an accident to facilitate liability decisions. WIDE evaluates integrity data generated by these vehicles, called witnesses, event assure reliability be used making decisions and ensure that such are received from credible witnesses. To achieve this, introduces two-level assessment end-to-end...
In electronic governance (e-governance) system, citizens can access government services such as transportation, licensing and immigration remotely over the Internet. With development of information communication technology, usage e-governance system has been increased. To efficiently provide with various services, multi-server environments be applied to system. However, messages inserted, delet...
Fog computing as an extension to the cloud infrastructure has been invaluable in enhancing applicability of Internet Things (IoT) paradigm. IoT based systems magnify range and minimize latency applications. However, fog nodes are considered transient they offer authenticated services, when end device loses connectivity with a node, it must authenticate freshly secondary node. In this work, we p...
Abstract With the widespread use of Internet Things and cloud computing in smart cities, various security privacy challenges may be encountered.The most basic problem is authentication between each application, such as participating users, IoT devices, distributed servers, centers, etc. In 2020, Kang et al. improved an protocol for IoT-Enabled devices a environment its main purpose was order to...
Many patients have begun to use mobile applications handle different health needs because they can better access high-speed Internet and smartphones. These devices are now increasingly used integrated through the medical of Things (mIoT). mIoT is an important part digital transformation healthcare, it introduce new business models allow efficiency improvements, cost control improve patient expe...
Fifth generation (5G) mobile technology enables a new kind of network that provides high peak data rates, ultra-low latency communication and user density. Electronic healthcare (e-health) allows the to be stored shared in highly efficient flexible manner. Group e-health services help improving long-term results treatments due its collaborative characteristic. The including real-time remote pat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید