Assessing risks and threats with layered approach to Internet of Things security [PDF]
Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation.
Murat Aydos, Yılmaz Vural, Adem Tekerek
doaj +2 more sources
Adapting the Presentation Layer in Rich Internet Applications [PDF]
Rich Internet Applications offer Web surfers a richer user experience, mainly due to better responsiveness and enhanced user interface capabilities. In recent years, existing design methodologies targeting traditional Web 1.0 applications were extended to also support RIAs.
Irene Garrigós +2 more
openalex +6 more sources
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security [PDF]
Satellite internet serves as an indispensable component of the upcoming sixth-generation networks for providing global broadband internet access service.
Yu Zhang +5 more
doaj +2 more sources
Proving Properties of Rich Internet Applications [PDF]
We introduce application layer specifications, which allow us to reason about the state and transactions of rich Internet applications. We define variants of the state/event based logic UCTL* along with two example applications to demonstrate this ...
James Smith
doaj +4 more sources
Cross-layer QoS Support for Multimedia Delivery over Wireless Internet
Delivering multimedia over wireless Internet is a very challenging task. Multimedia delivery inherently has strict quality of service (QoS) requirement on bandwidth, delay, and delay jitter.
Zhang Qian, Yang Fan, Zhu Wenwu
doaj +2 more sources
Network layer solutions for a content-centric internet [PDF]
Nowadays most people exploit the Internet to get contents such as web pages, music or video files. These users only value “what” they download and are not interested about “where” content is actually stored. The IP layer does the opposite and cares about
Blefari-Melazzi N, Detti A
core +6 more sources
MAC Layer Protocols for Internet of Things: A Survey [PDF]
Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these
Luiz Oliveira +4 more
doaj +3 more sources
Parameter-Free Statistical Generator-Based Class Incremental Learning for Multi-User Physical Layer Authentication in the Industrial Internet of Things. [PDF]
Zhao W, Guo Y, Huang Y, Chen Y, Chen L.
europepmc +3 more sources
Research on Key Technologies and Applications of Energy Internet Blockchain [PDF]
In view of the challenges facing the current development of energy Internet, the basic theory, architecture implementation and application mode of energy blockchain technology are proposed from the communication layer, data layer and contract layer.
Zhu Xingxiong
doaj +1 more source
Research on blockchain mechanism of mine Internet of things
The mine Internet of things has the characteristics of large-scale and massive data transmission. These characteristics make the traditional network security and privacy protection methods unable to guarantee the traceability and reliability of key data.
ZHANG Liya +3 more
doaj +1 more source

