Sign Up to like & get
recommendations!
0
Published in 2020 at "Wireless Networks"
DOI: 10.1007/s11276-019-01984-x
Abstract: Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined…
read more here.
Keywords:
policy based;
collaborative policy;
based security;
security scheme ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3267718
Abstract: Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.…
read more here.
Keywords:
security scheme;
mqtt;
security;
robust security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2017.2737885
Abstract: Improving confidentiality is a main concern in most wireless transmission systems. Traditionally, confidentiality is guaranteed by means of encryption, where transmitted data are encrypted prior to transmission and only the intended receiver(s) can decrypt them.…
read more here.
Keywords:
layer security;
physical layer;
security scheme;
layer ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2019.2951474
Abstract: Potential adversary and maliciously-behaved vehicles may cause traffic chaos or even lead to traffic accidents (particularly on traffic congestion crossroads). To address this issue, a novel security scheme is proposed for facilitating an efficient vehicular…
read more here.
Keywords:
quantum secret;
scheme;
secret sharing;
security scheme ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "PLoS ONE"
DOI: 10.1371/journal.pone.0265993
Abstract: Background Nepal has implemented the social health security program in certain health facilities to improve access to quality health services. The aim of the study is to understand the utilization pattern of social health security…
read more here.
Keywords:
security scheme;
social health;
health;
health security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Intelligent Engineering and Systems"
DOI: 10.22266/ijies2017.0630.11
Abstract: Cloud computing is a paradigm which offers a range of services to the cloud users. Cloud storage is the most popular service, as the data owners are freed up from the data management and storage…
read more here.
Keywords:
storage;
layered security;
cloud storage;
security ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Frontiers in Neuroscience"
DOI: 10.3389/fnins.2023.1174096
Abstract: Body area network (BAN) is a body-centered network of wireless wearable devices. As the basic technology of telemedicine service, BAN has aroused an immense interest in academia and the industry and provides a new technical…
read more here.
Keywords:
data security;
security scheme;
ban;
security ... See more keywords