[PDF][PDF] [課題研究報告書] A Survey on Internet of Things for Smart Health Technologies

DT Le - 2018 - dspace02.jaist.ac.jp
… the smart healthcare system. In order to accomplish our objectives, we have conducted this
literature review. In this research, we focus on the following aspects of the healthcare system. …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… like authentication, trust management, and access control. … The authors of this paper reviewed
the security and threat in IoT … of industrial internet of things, IEEE Internet Things J. 6 (4) (…

應用於智慧家庭之物聯網身分驗證機制

YJ Chen, GY Liao, PY Chiu - 前瞻科技與管理, 2023 - airitilibrary.com
devices in the home is usually limited, this thesis proposes an identity and packet verification
mechanism that gives the smart home a lightweight computing and secure environment. …

[HTML][HTML] 車聯網中具隱私保護與服務權限管理之機制研究

WC Wu - 2016 - ir.lib.ncu.edu.tw
… Given the above security considerations, we present a method of privacy-preserving
authentication and services access control in the IoV. In this system, only the Certificate Authority (…

[引用][C] 後五代行動網路下之具隱私性保護且高效率的安全網路切片配對方法

宋政緯

[引用][C] 利用變色龍雜湊函數技術實現無線網路之安全機制

陳政燁 - 2015 - 撰者

[HTML][HTML] 於軟體定義網路環境中基於信任度演算法實現可信工控物聯網之建置

TW Wang - 2022 - ir.lib.ncu.edu.tw
… Considering the situation of device intrusion, even after device authentication, this thesis …
of devices with a centralized controller and implement fine-grained identity access control. The …

EdgeKeeper: 一种适应泛在电力物联网的可信边缘计算框架

W Yang, W Liu, X Wei, Z Guo, K Yang… - Frontiers of Information …, 2021 - Springer
… the platform management personnel should review the security, … security system and full disk
encryption at the system level. … To enrich the access control mechanism of EdgeKeeper, we …

[HTML][HTML] 基于区块链的物联网数据访问控制方案

朱帅禎, 曹丽 - Computer Science and Application, 2022 - hanspub.org
… IoT devices. In order to solve this problem, this paper proposes a blockchain-based IoT data
access control … reducing the computational pressure on the user side, solving the problem of …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

E AYDIN - 2022 - polen.itu.edu.tr
Access control of a system consists of authentication, … Authentication is the most important
step of the access … proposed group authentication method are presented by a review of each …