Results 31 to 40 of about 84,714 (295)

SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT

open access: yesMathematics, 2022
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy.
Bai Liu   +4 more
doaj   +1 more source

ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services

open access: yesIEEE Access, 2021
Remote attestation (RA) is a security mechanism that verifies the trustworthiness of remote IoT devices. Traditional RA protocols aim to detect the presence of malicious code in the static memory of a device.
Ragnar Mikael Halldorsson   +2 more
doaj   +1 more source

EC-CENTRIC: An Energy- and Context-Centric Perspective on IoT Systems and Protocol Design [PDF]

open access: yes, 2017
The radio transceiver of an IoT device is often where most of the energy is consumed. For this reason, most research so far has focused on low power circuit and energy efficient physical layer designs, with the goal of reducing the average energy per ...
Biason, Alessandro   +6 more
core   +1 more source

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

open access: yesSensors, 2020
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily ...
Hichem Mrabet   +3 more
doaj   +1 more source

DESIGN AND IMPLEMENT AN INTEROPERABLE INTERNET OF THINGS APPLICATION BASED ON AN EXTENDED OGC SENSORTHINGS API STANDARD [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2016
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people’s ...
C. Y. Huang, C. H. Wu
doaj   +1 more source

Goodbye, ALOHA! [PDF]

open access: yes, 2016
©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Alonso Zárate, Jesús   +4 more
core   +2 more sources

Middleware Technologies for Cloud of Things - a survey [PDF]

open access: yes, 2017
The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future.
Farahbakhsh, Reza   +3 more
core   +5 more sources

A Systematic Review on the Data Interoperability of Application Layer Protocols in Industrial IoT

open access: yesIEEE Access, 2021
Due to the rising popularity of the Internet of Things (IoT), interconnected infrastructures with better flexibility and efficiency are being developed for industry 4.0.
Anam Amjad   +3 more
doaj   +1 more source

PUF Based Authentication Protocol for IoT [PDF]

open access: yesSymmetry, 2018
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other is an essential feature to provide in order to establish trust among its users. Physical Unclonable Functions (PUFs) on a device represent a low cost primitive exploiting the unique random patterns in the device and have been already applied in a ...
openaire   +2 more sources

Analysis of breast region segmentation in thermal images using U-Net deep neural network variants

open access: yesFrontiers in Bioinformatics
IntroductionBreast cancer detection using thermal imaging relies on accurate segmentation of the breast region from adjacent body areas. Reliable segmentation is essential to improve the effectiveness of computer-aided diagnosis systems.MethodsThis study
Rafhanah Shazwani Rosli   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy