Articles with "security scheme" as a keyword



Photo by scottwebb from unsplash

A collaborative policy-based security scheme to enforce resource access controlling mechanism

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Networks"

DOI: 10.1007/s11276-019-01984-x

Abstract: Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined… read more here.

Keywords: policy based; collaborative policy; based security; security scheme ... See more keywords
Photo by scottwebb from unsplash

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3267718

Abstract: Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.… read more here.

Keywords: security scheme; mqtt; security; robust security ... See more keywords
Photo from wikipedia

A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2017.2737885

Abstract: Improving confidentiality is a main concern in most wireless transmission systems. Traditionally, confidentiality is guaranteed by means of encryption, where transmitted data are encrypted prior to transmission and only the intended receiver(s) can decrypt them.… read more here.

Keywords: layer security; physical layer; security scheme; layer ... See more keywords
Photo by krakenimages from unsplash

An Efficient Security Scheme for Vehicular Communication Using a Quantum Secret Sharing Method

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2019.2951474

Abstract: Potential adversary and maliciously-behaved vehicles may cause traffic chaos or even lead to traffic accidents (particularly on traffic congestion crossroads). To address this issue, a novel security scheme is proposed for facilitating an efficient vehicular… read more here.

Keywords: quantum secret; scheme; secret sharing; security scheme ... See more keywords
Photo from wikipedia

Utilization of social health security scheme among the households of Illam district, Nepal

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0265993

Abstract: Background Nepal has implemented the social health security program in certain health facilities to improve access to quality health services. The aim of the study is to understand the utilization pattern of social health security… read more here.

Keywords: security scheme; social health; health; health security ... See more keywords
Photo from wikipedia

TSS – Twin Layered Security Scheme for Cloud Storage to Preserve Data Integrity

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Intelligent Engineering and Systems"

DOI: 10.22266/ijies2017.0630.11

Abstract: Cloud computing is a paradigm which offers a range of services to the cloud users. Cloud storage is the most popular service, as the data owners are freed up from the data management and storage… read more here.

Keywords: storage; layered security; cloud storage; security ... See more keywords
Photo by campaign_creators from unsplash

A data security scheme based on EEG characteristics for body area networks

Sign Up to like & get
recommendations!
Published in 2023 at "Frontiers in Neuroscience"

DOI: 10.3389/fnins.2023.1174096

Abstract: Body area network (BAN) is a body-centered network of wireless wearable devices. As the basic technology of telemedicine service, BAN has aroused an immense interest in academia and the industry and provides a new technical… read more here.

Keywords: data security; security scheme; ban; security ... See more keywords