[PDF][PDF] [課題研究報告書] A Survey on Internet of Things for Smart Health Technologies
DT Le - 2018 - dspace02.jaist.ac.jp
… the smart healthcare system. In order to accomplish our objectives, we have conducted this
literature review. In this research, we focus on the following aspects of the healthcare system. …
literature review. In this research, we focus on the following aspects of the healthcare system. …
[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology
BK Mohanta, D Jena, U Satapathy - researchgate.net
… like authentication, trust management, and access control. … The authors of this paper reviewed
the security and threat in IoT … of industrial internet of things, IEEE Internet Things J. 6 (4) (…
the security and threat in IoT … of industrial internet of things, IEEE Internet Things J. 6 (4) (…
應用於智慧家庭之物聯網身分驗證機制
YJ Chen, GY Liao, PY Chiu - 前瞻科技與管理, 2023 - airitilibrary.com
… devices in the home is usually limited, this thesis proposes an identity and packet verification
mechanism that gives the smart home a lightweight computing and secure environment. …
mechanism that gives the smart home a lightweight computing and secure environment. …
[HTML][HTML] 車聯網中具隱私保護與服務權限管理之機制研究
WC Wu - 2016 - ir.lib.ncu.edu.tw
… Given the above security considerations, we present a method of privacy-preserving
authentication and services access control in the IoV. In this system, only the Certificate Authority (…
authentication and services access control in the IoV. In this system, only the Certificate Authority (…
[HTML][HTML] 於軟體定義網路環境中基於信任度演算法實現可信工控物聯網之建置
TW Wang - 2022 - ir.lib.ncu.edu.tw
… Considering the situation of device intrusion, even after device authentication, this thesis …
of devices with a centralized controller and implement fine-grained identity access control. The …
of devices with a centralized controller and implement fine-grained identity access control. The …
EdgeKeeper: 一种适应泛在电力物联网的可信边缘计算框架
W Yang, W Liu, X Wei, Z Guo, K Yang… - Frontiers of Information …, 2021 - Springer
… the platform management personnel should review the security, … security system and full disk
encryption at the system level. … To enrich the access control mechanism of EdgeKeeper, we …
encryption at the system level. … To enrich the access control mechanism of EdgeKeeper, we …
[HTML][HTML] 基于区块链的物联网数据访问控制方案
朱帅禎, 曹丽 - Computer Science and Application, 2022 - hanspub.org
… IoT devices. In order to solve this problem, this paper proposes a blockchain-based IoT data
access control … reducing the computational pressure on the user side, solving the problem of …
access control … reducing the computational pressure on the user side, solving the problem of …
[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL
E AYDIN - 2022 - polen.itu.edu.tr
… Access control of a system consists of authentication, … Authentication is the most important
step of the access … proposed group authentication method are presented by a review of each …
step of the access … proposed group authentication method are presented by a review of each …