咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 8 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 5 篇 软件工程
    • 4 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 城乡规划学
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
    • 1 篇 政治学
  • 2 篇 理学
    • 2 篇 化学
    • 2 篇 生物学
  • 1 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 管理学
    • 1 篇 工商管理
    • 1 篇 公共管理

主题

  • 12 篇 secure communica...
  • 2 篇 internet of thin...
  • 2 篇 secure mobile da...
  • 2 篇 wireless sensor ...
  • 2 篇 security
  • 2 篇 mobile data coll...
  • 2 篇 mobile security
  • 2 篇 https
  • 2 篇 secure mobile da...
  • 2 篇 sensor networks
  • 1 篇 iot devices
  • 1 篇 wireless devices
  • 1 篇 wireless transmi...
  • 1 篇 internet of thin...
  • 1 篇 data security
  • 1 篇 lightweight data...
  • 1 篇 cloud-based mach...
  • 1 篇 mobile ad hoc ne...
  • 1 篇 compressive sens...
  • 1 篇 compressed sensi...

机构

  • 2 篇 univ bergen dept...
  • 1 篇 department of el...
  • 1 篇 fdn res & techno...
  • 1 篇 andhra pradesh p...
  • 1 篇 school of engine...
  • 1 篇 department of co...
  • 1 篇 lovely professio...
  • 1 篇 univ parma dept ...
  • 1 篇 new horizon coll...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 univ sfax higher...
  • 1 篇 calif state univ...
  • 1 篇 baghdad iraq
  • 1 篇 univ bergen ctr ...
  • 1 篇 isims & sm rts c...
  • 1 篇 univ fed santa c...
  • 1 篇 duy tan univ gra...
  • 1 篇 department of co...
  • 1 篇 natl chung hsing...

作者

  • 1 篇 hsueh ching-tsun...
  • 1 篇 solainayagi p.
  • 1 篇 klungsoyr jorn
  • 1 篇 papadakis stefan...
  • 1 篇 manjunatha
  • 1 篇 tygar jd
  • 1 篇 mancini f.
  • 1 篇 szewczyk r
  • 1 篇 fourati lamia ch...
  • 1 篇 srinivasan c.
  • 1 篇 frohlich antonio...
  • 1 篇 wen chih-yu
  • 1 篇 ahmed al-jumaili...
  • 1 篇 de lucena mateus...
  • 1 篇 dutt amit
  • 1 篇 pravallika b.
  • 1 篇 valvik r. a. b.
  • 1 篇 ferrari gianluig...
  • 1 篇 chee k. -w. -a.
  • 1 篇 cirani simone

语言

  • 12 篇 英文
检索条件"主题词=Secure Communication Protocols"
12 条 记 录,以下是1-10 订阅
排序:
Security and Effectiveness Analysis of the Gateway Integrity Checking Protocol
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND secure COMPUTING 2022年 第4期19卷 2396-2404页
作者: de Lucena, Mateus M. Frohlich, Antonio Augusto Univ Fed Santa Catarina BR-88040900 Florianopolis SC Brazil
Industrial Internet of Things (IIoT) gateways connected to the Internet are often based on conventional operating systems such as Linux and on conventional communication protocols such as HTTPS and therefore are valua... 详细信息
来源: 评论
Ensuring Data Security in eLearning: Challenges and Solutions
Ensuring Data Security in eLearning: Challenges and Solution...
收藏 引用
International Conference on Computational Science and Computational Intelligence (CSCI)
作者: Jorayeva, Shirin Eyadat, Mohammad S. Calif State Univ Informat Syst & Operat Management Los Angeles CA 90032 USA
eLearning has become the new nor i education after the COVID19 pandemic. The era of internet and mobile technologies is an integral part of the shift from traditional methods to eLearning and teaching pedagogies. Ther... 详细信息
来源: 评论
Data Privacy and Confidentiality in Healthcare Applications of IoT-Enabled Wireless Sensor Networks  2
Data Privacy and Confidentiality in Healthcare Applications ...
收藏 引用
2nd International Conference on Smart Technologies for Smart Nation, SmartTechCon 2023
作者: Vinola, C. Solainayagi, P. Kuppusamy, P.G. Premi, Godwin Srinivasan, C. Department of Computer Science and Engineering Sri Sairam College of Engineering Anekal Karnataka Bengaluru India Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Tamil Nadu Paiyanoor India Andhra Pradesh Puttur India Department of Electronics and Communication Engineering Sathyabama Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamil Nadu Chennai India
In this paper, a comprehensive framework for protecting sensitive healthcare information in Internet of Things (IoT)-enabled Wireless Sensor Network (WSN) is presented. Sensitive medical data is protected by the propo... 详细信息
来源: 评论
secure IoT-Based Health Monitoring with Cloud-Based Machine Learning Analytics  1
Secure IoT-Based Health Monitoring with Cloud-Based Machine ...
收藏 引用
1st International Conference on Artificial Intelligence for Innovations in Healthcare Industries, ICAIIHI 2023
作者: Deshmukh, Ram Gubbala, Arshini Pravallika, B. Dutt, Amit Ahmed Al-Jumaili, Ahmed Sabah Manjunatha School of Engineering Sr University Telangana Warangal India Department of Electronics and Computer Engineering Visakhapatnam India Institute of Aeronautical Engineering Dundigal Hyderabad India Lovely Professional University Phagwara India Baghdad Iraq New Horizon College of Engineering Department of Mechanical Engineering Bangalore India
The development and deployment of an efficient and trustworthy Internet of Things-based health monitoring system are presented in this study. The system uses biometric authentication, a PKI framework, TLS, and MQTT fo... 详细信息
来源: 评论
Analysis of LoRaWAN 1.0 and 1.1 protocols Security Mechanisms
收藏 引用
SENSORS 2022年 第10期22卷 3717-3717页
作者: Loukil, Slim Fourati, Lamia Chaari Nayyar, Anand Chee, K. -W. -A. Univ Sfax Higher Inst Business Adm Sfax 3018 Tunisia ISIMS & SM RTS CRNS Lab Signals Syst ARtificial I Sfax 3018 Tunisia Duy Tan Univ Grad Sch Fac Informat Technol Da Nang 550000 Vietnam Kyungpook Natl Univ Sch Elect & Elect Engn Daegu 41566 South Korea Kyungpook Natl Univ Sch Elect Engn Coll IT Engn Daegu 41566 South Korea
LoRaWAN is a low power wide area network (LPWAN) technology protocol introduced by the LoRa Alliance in 2015. It was designed for its namesake features: long range, low power, low data rate, and wide area networks. Ov... 详细信息
来源: 评论
Experiences with deploying Compressive Sensing and Matrix Completion techniques in IoT devices  19
Experiences with deploying Compressive Sensing and Matrix Co...
收藏 引用
19th IEEE International Workshop on Computer Aided Modeling and Design of communication Links and Networks (CAMAD)
作者: Fragkiadakis, Alexandros Charalampidis, Pavlos Papadakis, Stefanos Tragos, Elias Fdn Res & Technol Hellas FORTH ICS Inst Comp Sci Iraklion Crete Greece
The Internet of Things (IoT) presents itself as a promising set of technologies for providing innovative smart applications in a number of domains, spreading from agriculture to buildings and industrial control. For p... 详细信息
来源: 评论
Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview
收藏 引用
ALGORITHMS 2013年 第2期6卷 197-226页
作者: Cirani, Simone Ferrari, Gianluigi Veltri, Luca Univ Parma Dept Informat Engn Parco Area Sci 181-A I-43124 Parma Italy
The Internet of Things (IoT) refers to the Internet-like structure of billions of interconnected constrained devices, denoted as "smart objects". Smart objects have limited capabilities, in terms of computat... 详细信息
来源: 评论
Challenges in Implementing an End-to-End secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings  12
Challenges in Implementing an End-to-End Secure Protocol for...
收藏 引用
4th International Symposium on Engineering secure Software and Systems
作者: Gejibo, Samson Mancini, Federico Mughal, Khalid A. Valvik, Remi Klungsoyr, Jorn Univ Bergen Ctr Int Hlth N-5020 Bergen Norway Univ Bergen Dept Informat N-5008 Bergen Norway
Mobile devices are having a profound impact on how services can be delivered and how information can be shared. Sensitive information collected in remote communities can be relayed to local health care centers and fro... 详细信息
来源: 评论
secure Mobile Data Collection Systems for Low-Budget Settings
Secure Mobile Data Collection Systems for Low-Budget Setting...
收藏 引用
7th International Conference on Availability, Reliability and Security (ARES)
作者: Mancini, F. Gejibo, S. Mughal, K. A. Valvik, R. A. B. Klungsoyr, J. Univ Bergen Dept Informat N-5008 Bergen Norway Univ Bergen Ctr Int Hlth N-5008 Bergen Norway
Lack of infrastructures in health care and transportation, combined with the demand for low cost health services and shortage of medical professionals, are some of the known causes for loss of life in low income count... 详细信息
来源: 评论
secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks
收藏 引用
SENSORS 2010年 第2期10卷 1251-1278页
作者: Hsueh, Ching-Tsung Li, Yu-Wei Wen, Chih-Yu Ouyang, Yen-Chieh Natl Chung Hsing Univ Grad Inst Commun Engn Dept Elect Engn Taichung 402 Taiwan
This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the loca... 详细信息
来源: 评论