Results 21 to 30 of about 849,579 (245)

Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks [PDF]

open access: yes, 2016
Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar.
Alocious, Chaminda   +2 more
core   +2 more sources

Technical challenges for identification in mobile environments [PDF]

open access: yes, 2010
This report describes technical challenges and requirements for identification of individuals in mobile (i.e. non-stationary) environments as e.g. required by the ¿European Mobile Identification Interoperability Group¿ (MOBIDIG).
KEUS Klaus, LOESCHNER Jan
core   +1 more source

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Mobile identification: from functional requirements, to testing for interoperability and security [PDF]

open access: yes, 2011
The present document provides an analysis of the technical, functional and interoperability requirements for a generic mobile identification solution. The report starts from the findings and discussions held so far in the context of the e-MOBIDIG working
ALESSANDRONI Alessandro, RANA Antonia
core   +1 more source

Considerations for the Development of Mobile Phone Apps to Support Diabetes Self-Management: Systematic Review

open access: yesJMIR mHealth and uHealth, 2018
BackgroundThere is increased research interest in the use of mobile phone apps to support diabetes management. However, there are divergent views on what constitute the minimum standards for inclusion in the development of mobile phone apps. Mobile phone
Adu, Mary D   +4 more
doaj   +1 more source

Augmented PIN Authentication through Behavioral Biometrics

open access: yesSensors, 2022
Personal Identification Numbers (PINs) are widely used today for user authentication on mobile devices. However, this authentication method can be subject to several attacks such as phishing, smudge, and side-channel.
Matteo Nerini   +2 more
doaj   +1 more source

AN ENHANCED BINDING UPDATE SCHEME FOR NEXT GENERATION INTERNET PROTOCOL MOBILITY [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
In recent years, the usage of mobile devices has become essential for people, both for business and for their daily activities. The mobile devices can get services directly from their home network and from other correspondent devices regardless of their ...
SENTHILKUMAR MATHI, M. L. VALARMATHI
doaj  

A Survey on Trend and Classification of Internet of Things Reviews

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is shaping the current and next generation of the Internet. The vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and dense heterogeneous devices network.
Azana Hafizah Mohd Aman   +4 more
doaj   +1 more source

Development of security mechanisms for scada systems in the postquantium period

open access: yesСистеми обробки інформації, 2022
The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks.
О. В. Воропай   +3 more
doaj   +1 more source

Software for Wearable Devices: Challenges and Opportunities

open access: yes, 2015
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy