基于信息-物理-社会-思维融合空间的物联网科学技术体系研究

HS Ning, H Liu - Science China Information Sciences, 2015 - Springer
… three layers are similar to the traditional IoT layers … , security and privacy should be studied
considering the following aspects: • Physical security and privacy considers external contexts

[PDF][PDF] 阁EasyChair Preprint

NEMM Threats - 2024 - easychair.org
… multi-layered defense mechanisms… privacy and data protection in the context of mobile
malware. It discusses encryption techniques, data minimization practices, and user-centric privacy

[PDF][PDF] 阁EasyChair Preprint

SB Bharath, D Chandrasekaran, MS Minu - 2020 - easychair.org
… between the hosts and cellular networks using the Internet of Things. This technique works
with different layers of security for information transmission between the devices and hence …

How do macro-environmental factors impact customer experience? A refined typology, integrative framework, and implications: 宏观环境因素如何影响客户体验? 精炼 …

J Cambra-Fierro, L Gao, ME López-Pérez… - The Service …, 2022 - Taylor & Francis
… customer experience was related to the multiple-layered environmental factors. To do so, we
… To continue, we examined how customer experience is addressed in the context of macro-…

[PDF][PDF] 将电气工程师学会1609.2-2016 标准与基于事物的低功耗设备互连

Y Al-Nidawi, MZ Abdullah - 西南交通大学学报, 2020 - researchgate.net
… addressed the security issue under the IoV context. Bruno et … of this stack and both ICMP
and UDP are the transport layer. … Interfacing and combining physical layers of these standards …

[PDF][PDF] 闽EasyChair Preprint

K Karuppusamy, P Madhavan - 2020 - easychair.org
… In this context, envision a reliable distributed cloud models to improve the performance of …
of layers, such as cloud, fog and edge layers. The edge server requires this number of layers

TrustChain: 具有可信执行环境的隐私保护智能合约模型⋆

F Wu, A Ye, Y Diao, Y Zhang, J Chen… - Available at SSRN … - papers.ssrn.com
… work in the field of blockchain privacy protection. Section 3 discusses the background. We
then … Therefore, a multi-layered security mechanism should be employed, and an appropriate …

[PDF][PDF] 移动边缘计算中计算卸载方案研究综述

张依琳, 梁玉珠, 尹沐君, 全韩彧, 王田, 贾维嘉 - 计算机学报, 2021 - cjc.ict.ac.cn
… Finally, we conclude technological challenges which include mobility of end devices, edge
servers, security, user privacy data, and service heterogeneity and prospect future directions …

[PDF][PDF] 阁EasyChair Preprint

A Luz - 2024 - easychair.org
… In the context of the banking sector, this approach offers a … and Portability Layers Implement
abstraction and portability layers, … These layers provide a consistent interface and set of APIs, …

[PDF][PDF] 阁EasyChair Preprint

K Al-Handali, Z Al-Sharafi, Z Al-Hamadi - 2022 - easychair.org
… Different types of network cables, such as coaxial cable, optical fiber cable, and twisted pair
cables, are used depending on the network's physical layer, topology, and size. The devices …