[HTML][HTML] An Authentication Protocol for the Medical Internet of Things
The progress in biomedical sensors, Internet of Things technologies, big data, cloud
computing, and artificial intelligence is leading the development of e-health medical …
computing, and artificial intelligence is leading the development of e-health medical …
[HTML][HTML] Distributed ledger technologies in vehicular mobile edge computing: a survey
M Jiang, X Qin - Complex & Intelligent Systems, 2022 - Springer
Blockchain-based systems, coined by distributed ledger technologies (DLTs), have rapidly
received tremendous interest from academia, industries, and governments. Recent literature …
received tremendous interest from academia, industries, and governments. Recent literature …
Cross-program taint analysis for IoT systems
Cross-program propagation of tainted data (such as sensitive information or user input) in an
interactive IoT system is listed among the OWASP IoT top 10 most critical security risks …
interactive IoT system is listed among the OWASP IoT top 10 most critical security risks …
[PDF][PDF] Anonymous authentication protocols for iot based-healthcare systems: a survey
Nowadays, with the increase in chronic diseases and the aging population in all countries, it
has become a huge burden on hospitals to accommodate all patients and monitor them …
has become a huge burden on hospitals to accommodate all patients and monitor them …
A survey on security issues and secure frameworks in internet of things (iot)
Technology advancements blend to masses with diverse and heterogeneous environments.
The Internet of Things (IoT) and Cloud Computing has broken through reachability and …
The Internet of Things (IoT) and Cloud Computing has broken through reachability and …
Fiden: Intelligent fingerprint learning for attacker identification in the industrial Internet of Things
Y Chen, W Hu, M Alam, T Wu - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
This article studies the attacker identification issue in the Industrial Internet of Things (IIoT).
There have been already some work that uses device fingerprinting to identify attackers, and …
There have been already some work that uses device fingerprinting to identify attackers, and …
IoT enabled smart farming: a review
Y Akshatha, AS Poornima - 2022 6th International Conference …, 2022 - ieeexplore.ieee.org
Agriculture is giving the major contribution to the Indian economy. The rapid growth in
digitization forced to convert many marketing sectors to adapt the modern technologies. The …
digitization forced to convert many marketing sectors to adapt the modern technologies. The …
An authentication technique based on oauth 2.0 protocol for internet of things (IoT) network
J Khan, J ping Li, I Ali, S Parveen… - … on wavelet active …, 2018 - ieeexplore.ieee.org
Internet of Things (loT) is the fast-growing emerging technology and it is making our daily life
(activities) easier and better. The loT is connecting millions of sensors and heterogeneous …
(activities) easier and better. The loT is connecting millions of sensors and heterogeneous …
A privacy-preserving efficient location-sharing scheme for mobile online social network applications
The rapid development of mobile internet technology and the better availability of GPS have
made mobile online social networks (mOSNs) more popular than traditional online social …
made mobile online social networks (mOSNs) more popular than traditional online social …
[PDF][PDF] Accessing Cloud Services Using Token based Framework for IoT Devices.
NS Yadav, M Rao, DV Parameswari, KLS Soujanya… - Webology, 2021 - webology.org
Nowadays cloud environments are used by many business service sectors like healthcare,
retail marketing, banking, and many business fields. At the same time, the usage of Internet …
retail marketing, banking, and many business fields. At the same time, the usage of Internet …