Results 1 to 10 of about 8,202 (205)
Fast handover authentication scheme in 5G mobile edge computing scenarios
The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much ...
Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU
doaj +1 more source
En el presente estudio se dan a conocer por primera vez, datos sobre la interacción entre ejemplares de avispas de la especie Epipompilus platensis Roig Alsina, 2017 (Hymenoptera, Pompilidae) y arañas de la especie Ariadna mollis (Holmberg 1876) (Araneae,
Cecilia Sofía Gabellone +2 more
doaj +1 more source
The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection.
Evangelina Lara +3 more
doaj +1 more source
With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart building, and smart home services at anytime and anywhere in smart grid (SG) environments. The SG
SungJin Yu +6 more
doaj +1 more source
Se reporta por primera vez para el Ecuador, la presencia de Dinocampus coccinellae (Schrank, 1802) (Hymenoptera: Braconidae), avispa endoparasitoide cosmopolita que se especializa en parasitar especies de la familia Coccinellidae.
Pablo S. Padrón
doaj +1 more source
Security Property Validation of the Sensor Network Encryption Protocol (SNEP)
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use.
Salekul Islam
doaj +1 more source
4G mobile communication is a global technology. Therefore, it is essential to enforce confidentiality between mobile users and their networks. This paper presents a Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie ...
Karim H. Moussa +3 more
doaj +1 more source
Is it Safe to Adopt the Scrum Process Model?
Scrum is a widely known agile software process model specifically designed for guiding non- technical activities in software development. This process has been formally defined in EPF and adopted by several software companies around the world. But having
Julio Ariel Hurtado Alegría +2 more
doaj +1 more source
Se reporta por primera vez para Haití la avispa Scelioninae parasitoide de saltamontes Synoditella bisulcata (Kieffer).
Ruth H. Bastardo +1 more
doaj +1 more source
Se cita por primera vez para la República Dominicana la avispa parasítica Mymar taprobanicus Ward, 1875. Este registro se basa en un espécimen macho colectado en la Reserva Científica Loma Barbacoa, provincia Peravia.
Santo Navarro Morales
doaj +1 more source

