نتایج جستجو برای: avispa

تعداد نتایج: 166  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده کامپیوتر و فناوری اطلاعات 1392

تجارت سیار که یکی از فناوری های نوین در عرصه ی تجارت الکترونیک است، روز به روز محبوب تر می شود. این نوع تجارت راحتی و انعطاف پذیری را برای کاربران خود به ارمغان آورده است. با این حال، برخی از عوامل مانع پذیرش همه جانبه ی تجارت سیار می شود. امنیت همیشه بزرگ ترین چالش بوده است. انکارناپذیری که یکی از سرویس های امنیتی است، یک گواهی رمز شده برای تراکنش الکترونیک فراهم می آورد. تأمین این گواهی در تج...

Journal: :IEEE Transactions on Vehicular Technology 2021

The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single large drone to multiple small drones linked together in an ad-hoc fashion. To maintain Quality Service (QoS) multi-hop networking schema, FANETs utilize available resources efficiently. However, due open wireless boundary and high mobility drones, are vulnerable malicious nodes that can penetrate network and...

Journal: :Journal of Sensors 2022

Machine-to-machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. Many are connected perform task automatically in machine-to-machine communication, but they not properly secured, allowing an adversary compromise them against variety atta...

Journal: :Applied sciences 2023

The modern innovation called the Internet of Things (IoT) empowers individuals to connect anybody and anything at any point, wherever. application IoT in smart cities concerning healthcare management can improve patient welfare, user acceptance, standard living, accurate illness monitoring. Powered wheelchairs (PW) with sensors, computers, other connected assistive technologies are wheelchairs....

Journal: :Computers, materials & continua 2022

When the Wireless Sensor Network (WSN) is combined with Internet of Things (IoT), it can be employed in a wide range applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing big data generated by these applications Cloud Servers (CSs), requires higher levels authenticity and confidentiality during communication conducted through Internet. Signcryption o...

Journal: :International Journal of Information Security 2022

Abstract Smart homes are a special use-case of the IoT paradigm, which is becoming more and important in our lives. Although sensors, devices applications make daily lives easier, they often collect sensitive data, may lead to security problems (e.g., hacked devices, botnets, etc.). In several cases, appropriate mechanisms missing within devices. Therefore, measures have become central topic fi...

2015
Cristian Ene Laurent Mounier

Many applications rely on complex cryptographic protocols for communicating over the insecure Internet (e.g., online banking, electronic commerce, social networks, etc). The C programming language is largely used in writing cryptographic software. Both the design of protocols and their C implementation are error prone. Recent years have seen a real progress in the formal verification of cryptog...

Journal: :Technique et Science Informatiques 2012
Benoît Bertholon Sébastien Varrette Pascal Bouvry

Résumé La sécurité des Clouds est un aspect essentiel qui n’est pas forcément abordé selon le point de vue de l’utilisateur. En particulier, sur une plate-forme de type Infrastructure-as-a-Service (IaaS), il est actuellement impossible pour un utilisateur de certifier de manière fiable et sécurisée que l’environnement qu’il a déployé (typiquement sous forme d’une machine virtuelle) est toujours...

2012
Rémy Chrétien

Secure design of communication protocols in order to ensure the authen-tication of electronic agents or the safety of secret data is known to be difficult and fairly error-prone. Symbolic frameworks such as the Dolev-Yao model [17] and later various process algebra [1, 2] have proven themselves valuable for finding attacks and assessing the security of these protocols. Several tools have thus b...

Journal: :Ad Hoc Networks 2016
Ruhul Amin G. P. Biswas

Wireless sensor networks can be deployed in any attended or unattended environments like environmental monitoring, agriculture, military, health care etc., where the sensor nodes forward the sensing data to the gateway node. As the sensor node has very limited battery power and cannot be recharged after deployment, it is very important to design a secure, effective and lightweight user authenti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید